S12 - H4CKKernel-Land Malware ResurrectionWelcome to this new Medium post, today i will show you the kernel land version of our Malware Resurrector, this implementation its not…13h ago13h ago
S12 - H4CKReverse engineering a Java programHello folks, today let’s talk about reverse engineering, in more specific way reverse engineering programs that run on the JVM. As is well…2d ago2d ago
S12 - H4CKPersistence in Malware ResurrectionWelcome to my latest Medium post! Today, I’ll introduce you to a new variation of the resurrector malware. It’s not necessarily an improved…3d ago3d ago
S12 - H4CKCracking Hashes on Android: A Comprehensive Guide to FlutCrackHash functions are foundational in cryptography, used for everything from password storage to file integrity checks. But what if you want…Sep 8Sep 8
S12 - H4CKLocal Malware ResurrectionWelcome to my new Medium post today i will show you the new resurrector malware implementation, in the previous one when we detect that our…Sep 41Sep 41
S12 - H4CKMalware ResurrectionWelcome to this new Medium post where we will see my first resurrector malware implementation, but what exactly mean the Malware…Sep 2Sep 2
S12 - H4CKMap Free Memory HandlesWelcome to my new article, probably the readers of this post are malware developers or aspirant to malware developers, and for all this…Aug 31Aug 31
S12 - H4CKEvade Sysmon RulesWelcome to this new Medium post! Today, I will show you the easiest way to evade Sysmon rules. But before we dive into the details, let’s…Aug 28Aug 28
S12 - H4CKGet Sysmon Driver NameWelcome to this new Medium post, today i will show you the best way to get the name of the running Sysmon instance driver.Aug 27Aug 27
S12 - H4CKSysmon SilentGagHey everyone! In this post, I’m going to walk you through a technique called SilentGag, which is all about silencing Sysmon’s event logging…Aug 25Aug 25