S12 - H4CKAdding AntiDebugging Techniques to Malware ResurrectorWelcome to this new Medium post, today i will show you the new version of our resurrector malware, in this case we are adding some…12h ago12h ago
S12 - H4CKService Detection in Malware ResurrectorWelcome to this new Medium post, today i will show you the new version of our Resurrector implementation, in this new version i was adding…2d ago2d ago
S12 - H4CKBeginner’s Guide to Windows Kernel Mode for Malware Developers Part 1If you’re diving into malware development, especially when it comes to creating drivers or interacting with the Windows kernel…3d ago3d ago
S12 - H4CKKernel-Land Malware ResurrectionWelcome to this new Medium post, today i will show you the kernel land version of our Malware Resurrector, this implementation its not…6d ago6d ago
S12 - H4CKReverse engineering a Java programHello folks, today let’s talk about reverse engineering, in more specific way reverse engineering programs that run on the JVM. As is well…Sep 17Sep 17
S12 - H4CKPersistence in Malware ResurrectionWelcome to my latest Medium post! Today, I’ll introduce you to a new variation of the resurrector malware. It’s not necessarily an improved…Sep 16Sep 16
S12 - H4CKCracking Hashes on Android: A Comprehensive Guide to FlutCrackHash functions are foundational in cryptography, used for everything from password storage to file integrity checks. But what if you want…Sep 8Sep 8
S12 - H4CKLocal Malware ResurrectionWelcome to my new Medium post today i will show you the new resurrector malware implementation, in the previous one when we detect that our…Sep 41Sep 41
S12 - H4CKMalware ResurrectionWelcome to this new Medium post where we will see my first resurrector malware implementation, but what exactly mean the Malware…Sep 2Sep 2
S12 - H4CKMap Free Memory HandlesWelcome to my new article, probably the readers of this post are malware developers or aspirant to malware developers, and for all this…Aug 31Aug 31