Moataz OsamaMalware Development Part 4: Direct Syscall InjectionIn our ongoing Malware Development Series, we have explored Shellcode Injection, DLL Injection, and NTAPI Injection. This time, we’re…Nov 30
Regan TemudoOpenAI Exposes Hackers Using ChatGPT to Develop MalwareOpenAI has confirmed that its AI-powered chatbot, ChatGPT, is being exploited by hackers to create malware and conduct various…Oct 14Oct 14
RED TEAMMalware Development : Part 1Where do I start, and what are all the things I need to learn.Mar 72Mar 72
InOSINT TeambyMohammed DiefWriting your own ransomware for windows in PythonDid you ever wonder how ransomwares work in general? Such programs being able to cause so much damage shouldn’t be this complicated in my…Oct 13Oct 13
Moataz OsamaMalware Development Part 4: Direct Syscall InjectionIn our ongoing Malware Development Series, we have explored Shellcode Injection, DLL Injection, and NTAPI Injection. This time, we’re…Nov 30
Regan TemudoOpenAI Exposes Hackers Using ChatGPT to Develop MalwareOpenAI has confirmed that its AI-powered chatbot, ChatGPT, is being exploited by hackers to create malware and conduct various…Oct 14
RED TEAMMalware Development : Part 1Where do I start, and what are all the things I need to learn.Mar 72
InOSINT TeambyMohammed DiefWriting your own ransomware for windows in PythonDid you ever wonder how ransomwares work in general? Such programs being able to cause so much damage shouldn’t be this complicated in my…Oct 13
RED TEAMMalware Development : Part 3“Mastering Malware: A Journey Through Development Techniques”Mar 23
PenthosDeveloping C Applications on Windows with MSYS2 (& VSCODE)This guide provides a step-by-step process to set up MSYS2 on Windows, compile C applications (with Windows API usage), and optimize the…Oct 10
RED TEAMMalware Development Part 8 : Reverse Shell Via Dll Hijacking“From DLL to Shell: A Step-by-Step Guide to Reverse Shell via DLL Hijacking”Jun 22