S12 - H4CKProcess Shellcode Injection CheatSheetWelcome to this exclusive module to show you all the ways, options, extensions and all the stuff about the Process Shellcode Injection in…20h ago20h ago
S12 - H4CKRemote Function PatcherWelcome to my new post on Medium, today i will show you my new malware proof of concept. In this case we are seeing how we can patch…1d ago1d ago
S12 - H4CKDLL ProxyingWelcome to this new article. Today, I will show you the DLL Proxying Malware technique. This technique is used to deceive an executable…Jul 10Jul 10
S12 - H4CKPDF Icon File SpoofingWelcome to my new Malware Development post, in this one i wanna show you a simple but useful technique to cheat the victim user to click on…Jul 8Jul 8
S12 - H4CKStore Files in Windows RegistryIn the ever-evolving world of cybersecurity, where the line between ethical hacking and malevolent exploits blurs, it’s essential to…Jun 27Jun 27
S12 - H4CKHide Loaded DLL from Remote ProcessHey there, fellow tech enthusiasts and code explorers! In the ever-evolving world of cybersecurity and software development, there’s a…Jun 241Jun 241
S12 - H4CKPerform Process Injection approaching Opened HandlesHey there, folks! Ever wondered how to pull off some ninja-like process injection into a remote process without raising any red flags from…Jun 22Jun 22
S12 - H4CKMalware Development ModulesI’ve got some exciting news for you today. We’re rolling out a brand-new content category on our Malware Development Academy. Yup, you…Jun 203Jun 203
S12 - H4CKTimer MalwareWelcome to this groundbreaking article, where we delve into the realm of cutting-edge cyber threats and explore the intriguing world of…Jun 171Jun 171