Selective In-Memory Syscall UnhookingWelcome to this new post, in this one i will show you a new improvement of the typical Perun Farts technique.2h ago2h ago
Key Concepts to Start in Malware Development: Processes, Memory, and EvasionIf you want to get serious about ethical malware development (maldev), there are a few core topics you must truly understand before diving…4d agoA response icon34d agoA response icon3
Userland Hook DetectionWelcome to this new Medium post where we dive into the techniques used to detect and analyze userland hooks implemented by antivirus (AV)…Jul 7A response icon2Jul 7A response icon2
RC6 Shellcode EncryptionWelcome to this new Medium post. Today I will show you how to use the RC6 encryption algorithm to securely encrypt and decrypt shellcode…Jul 3Jul 3
Shellcode Execution Evading Windows DefenderWelcome to this new Medium post! In this article, we’ll show how to execute shellcode using a simple C++ Windows program while avoiding…Jun 30Jun 30
Ghost Driver InjectionWhen working with Windows drivers, one common challenge is how to load a driver without leaving obvious traces on the system. Normally…Jun 23Jun 23
Adding NOPs to shellcode to evade rule-based detectionWelcome to this new Medium post! In this article, I will show you how adding NOPs (No-Operation Instructions) to your shellcode can help…Jun 19Jun 19
Installing and Using YARA Malware DetectorYARA is a powerful tool used by malware analysts and cybersecurity professionals to detect and classify malware. Instead of relying on…Jun 16Jun 16
Introduction to Malware Analysis Course — From Beginner to ProHave you ever wondered how malware works? How it hides, infects, steals, and persists?Jun 15Jun 15