Skip to content

Latest commit

 

History

History
56 lines (54 loc) · 6.5 KB

File metadata and controls

56 lines (54 loc) · 6.5 KB

Not The Hidden Wiki

Learn Malware Dev


  • Offensive Rust - link
  • Creating Shellcode from any Code Using Visual Studio and C++ = link
  • Learning Silver C2: Stagers - link
  • Malicious Actors Use Unicode Support in Python to Evade Detection - link
  • PowerShell Obfuscation Bible - link
  • 11 Critical Malware Persistence Mechanisms - link
  • Malware Articles - link
  • x33fcon: Malware Development - link
  • AV Evasion Techniques - link
  • This map lists the essential techniques to bypass anti-virus and EDR - link
  • Bypassing EDRs With EDR-Preloading - link
  • Modern implant design: position independent malware development - link
  • GraphStrike: Anatomy of Offensive Tool Development - link
  • Calling Home, Get Your Callbacks Through RBI - link
  • Syscalls via Vectored Exception Handling - link
  • Bypass AMSI on Windows 11 - link
  • An Introduction to Bypassing User Mode EDR Hooks - link
  • Weaponizing DLL Hijacking via DLL Proxyinglink
  • Bypassing Windows Defender - link
  • Creating an OPSEC safe loader for Red Team Operations - link
  • Process Injection - Avoiding Kernel Triggered Memory Scans - link
  • Running PEs Inline Without a Console - link
  • An Introduction into Stack Spoofing - link
  • Writing a Windows Fuzzer From Scratch - link
  • Bypassing UAC with SSPI Datagram Contexts - link 26
  • Exploring Hell's Gate - link
  • Inline Assembly - link
  • Process injection in 2023, evading leading EDRs - link
  • Abusing undocumented features to spoof PE section headers - link
  • Direct Syscalls vs Indirect Syscalls - link
  • Shell We Assemble? - link
  • Direct Syscalls: A journey from high to low - link
  • New AMSI Bypass Using CLR Hooking - link
  • Evading Static Machine Learning Malware Detection Models – link
  • Ten process injection techniques: A technical survey of common and trending process injection techniques - link
  • Sandbox detection and evasion techniques. How malware has evolved over the last 10 years - link
  • Shellcode Development - link
  • (Anti-)Anti-Rootkit Techniques - Part I: UnKovering mapped rootkits - link
  • Finding and utilising leaked code signing certificates - link
  • Reflective DLL got Indirect Syscall skills - link
  • Windows Admin-to-Kernel Elevation of Privilege - link
  • Gold Pickaxe iOS Technical Analysis: IPA Overview and C2 Communication Start up - link
  • Obfuscating native code for fun: Part 1 - Introduction - link
  • addressofentrypoint overwrite process injection - link
  • Backdooring PE files with shellcode - link
  • Anti-debugging techniques - link
  • Import Address Table hooking - link
  • Anti-Debug tricks - link
  • Intro to Hypervisor Implants - link
  • MalDev Myths - link