Index of /MALWARE 8b74ccffb7e64efea30e3da4d919418d/
Name
Last Modified
Size
Parent Directory
63 Syscalls - Introduction b8f710a9d1a64edeac1abd028752da3c
2023-05-28 11:49
-
52 IAT Hiding & Obfuscation - Introduction 92083157ed3949938746858848e5ef9d
2023-05-28 11:49
-
10 Detection Mechanisms 8ac0fec121da4288a3f820552bfc3af0
2023-05-28 11:49
-
49 Process Argument Spoofing (2) 0f4d524b53fa4b2b9d2b2a52376a158a
2023-05-28 11:49
-
38 Thread Hijacking - Remote Thread Enumeration 0856586d8db7435fadc7ae2b918da7b2
2023-05-28 11:49
-
28 Process Injection - DLL Injection 673245a70556420cb999c1f1cc2723a9
2023-05-28 11:49
-
60 API Hooking - Minhook Library c42628518a7f494495b8c3af9e5203f3
2023-05-28 11:49
-
37 Thread Hijacking - Local Thread Enumeration 0e5417dc3f844a68aa319deb6a376ce9
2023-05-28 11:49
-
34 Process Enumeration - NtQuerySystemInformation 70484231965b41108520d9f7664...
2023-05-28 11:49
-
47 Spoofing PPID 5f6b664165244f6284dd737c7e5d823c
2023-05-28 11:49
-
20 Evading Microsoft Defender Static Analysis ae933861119142d192c7c88c47e0c256
2023-05-28 11:49
-
22 Payload Obfuscation - MACFucscation 8acebc37c16548f2a0279babcac9f579
2023-05-28 11:49
-
23 Payload Obfuscation - UUIDFuscation 1c2f59cabc354005973cf3e7692586c7
2023-05-28 11:49
-
57 IAT Hiding & Obfuscation - Compile Time API Has af3ce62d28bb4e0a824b7e3a42...
2023-05-28 11:49
-
40 Early Bird APC Injection a9fb0ac0fc464b7c8a61de3fba4d7c8c
2023-05-28 11:49
-
25 Maldev Academy Tool - MiniShell 2e5e50eff60245dd81620925222710d4
2023-05-28 11:49
-
35 Thread Hijacking - Local Thread Creation dfbe368a13a84ee793d9772723c40623
2023-05-28 11:49
-
58 API Hooking - Introduction b43ef4c2f27a4891a09b1ca65a4522fe
2023-05-28 11:49
-
51 String Hashing bda15d26efa8495790b4467721838661
2023-05-28 11:49
-
29 Process Injection - Shellcode Injection 462956fe40674d56baa665523f37bdf2
2023-05-28 11:49
-
59 API Hooking - Detours Library b06d3c8c1d6040d886472493a5084f2c
2023-05-28 11:49
-
13 Payload Placement - data & rdata Sections d402fbf89962436285694d655c54d6c3
2023-05-28 11:49
-
21 Payload Obfuscation - IPv4 IPv6Fuscation 9f7b77eecf01460d8d898195f70f4790
2023-05-28 11:49
-
64 Syscalls - Userland Hooking 874286351a4a4dc0a89d688487b2f698
2023-05-28 11:49
-
24 Maldev Academy Tool - HellShell 1c00f7dd2c7547de89956f25a050ea22
2023-05-28 11:49
-
48 Process Argument Spoofing (1) b427dcafb59043239840f40c0ab8dc81
2023-05-28 11:49
-
42 Local Mapping Injection a18ce0d426434c27b585cf1ddd825b70
2023-05-28 11:49
-
56 IAT Hiding & Obfuscation - Custom Pseudo Handle b9c801a007204fdfa5e888dc12...
2023-05-28 11:49
-
26 Local Payload Execution - DLL 047762d5d58a43308c08affcede128f9
2023-05-28 11:49
-
5 Windows Architecture 012cf6ad24cc4d18897cd9414c274997
2023-05-28 11:49
-
15 Payload Placement - rsrc Section c6369f39745844c8af17d37db5a75eac
2023-05-28 11:49
-
32 Malware Binary Signing fe21c309a829423fa32229958b372dac
2023-05-28 11:49
-
6 Windows Memory Management 3de16d4bafa34eb19106dd2c5f0ff634
2023-05-28 11:49
-
31 Payload Staging - Windows Registry e777de605e884adf970e64206c5d249f
2023-05-28 11:49
-
33 Process Enumeration - EnumProcesses 68c6d61e1bea4011b331a89d300322f9
2023-05-28 11:49
-
55 IAT Hiding & Obfuscation - API Hashing 3fe6fb0cde7d41fdb7357575d7685be3
2023-05-28 11:49
-
43 Remote Mapping Injection 268ba3a4ebcd42e8a6a99cf2c8eb88c2
2023-05-28 11:49
-
27 Local Payload Execution - Shellcode e1f075df7aa84bcd8b475e875c589a9b
2023-05-28 11:49
-
36 Thread Hijacking - Remote Thread Creation 8810a50599cc4cb7a0915dadf5cabe29
2023-05-28 11:49
-
46 Payload Execution Control 169c1c943aed40e096a42d7b9761c466
2023-05-28 11:49
-
50 Parsing PE Headers 7d60ebf31c744655b0a36dbbfcb8e9c1
2023-05-28 11:49
-
19 Payload Encryption - AES Encryption fa2ab3c6213d4a12a1394be735833ec7
2023-05-28 11:49
-
14 Payload Placement - text Section 7d566afd50194164979afb40c3c311f3
2023-05-28 11:49
-
44 Local Function Stomping Injection c935dd1a71c845059628b12d6c3cdcb8
2023-05-28 11:49
-
62 API Hooking - Using Windows APIs f8ded5cdb10a45bfbadda982993d6bcf
2023-05-28 11:49
-
3 Required Tools 4fe7ff0b0d174fa5a6d1ce0fd98d3197
2023-05-28 11:49
-
39 APC Injection 86545b9163834568b0a197adc696666e
2023-05-28 11:49
-
53 IAT Hiding & Obfuscation - Custom GetProcAddres aa735dbf7a4e4c188c8b6e8f85...
2023-05-28 11:49
-
54 IAT Hiding & Obfuscation - Custom GetModuleHand 031d95fe35cc41edac2064756d...
2023-05-28 11:49
-
30 Payload Staging - Web Server eda456e5264144a5896120955cee9540
2023-05-28 11:49
-
45 Remote Function Stomping Injection d7942e1bc9af45968f6b7eea69b6559e
2023-05-28 11:49
-
12 Undocumented Structures a1b1542a827d4ff2a42d99a97ef9e01d
2023-05-28 11:49
-
61 API Hooking - Custom Code 7e6302f71fe94f6786760d6f2b619236
2023-05-28 11:49
-
90 Block DLL Policy cf46e560a7fc47bcbb2c0ad81f874be6
2023-05-28 11:50
-
78 MalDev Academy Tool - KeyGuard 9ed61e52dac94108a2301370dbefb62a
2023-05-28 11:50
-
91 Diving Into NtCreateUserProcess 9128d84d1c2f49939aeffccbc228565b
2023-05-28 11:50
-
85 NTDLL Unhooking - From KnownDlls Directory db89a0c0abe54a799e9816e7a2237546
2023-05-28 11:50
-
68 Syscalls - Reimplementing Mapping Injection 2f2302d29c4b4300bc09befcc91e503c
2023-05-28 11:50
-
76 Binary Entropy Reduction e582eb6f4c64486f9a656a5b9e9d993b
2023-05-28 11:50
-
9 Dynamic-Link Library 81450f1651f74297aa2208e1dc397a4b
2023-05-28 11:50
-
65 Syscalls - SysWhispers b0330e613e8f4441bb581226cf7412ea
2023-05-28 11:50
-
8 Portable Executable Format a919d24f6aa94a2698766ef3f0bf5f21
2023-05-28 11:50
-
80 IAT Camouflage b3a2763284464e8f92ccbb50130694b4
2023-05-28 11:50
-
84 NTDLL Unhooking - From Disk 8aeadeff47ae40f2bf190a32b0678f0a
2023-05-28 11:50
-
81 Bypassing AVs c8b98ed828814f89b8db2d5ac5a9c230
2023-05-28 11:50
-
69 Syscalls - Reimplementing APC Injection 4134d6cae4f8487384888ad519adc700
2023-05-28 11:50
-
71 Anti-Debugging - Multiple Techniques 6e238e4d6c414f8f93da7cc5af419566
2023-05-28 11:50
-
75 Anti-Virtual Environments - API Hammering 65a79f843fa44243b4b53e9890141f43
2023-05-28 11:50
-
67 Syscalls - Reimplementing Classic Injection a51528df7b4045359976f170fab7b5ef
2023-05-28 11:50
-
83 NTDLL Unhooking - Introduction e62fdd6d30884ac798da2ab3901442cc
2023-05-28 11:50
-
66 Syscalls - Hell's Gate d6268c1cdf0f4709ae05a196f475974b
2023-05-28 11:50
-
86 NTDLL Unhooking - From a Suspended Process b586e5f76b064f63a867c116853ff11a
2023-05-28 11:50
-
88 Updating Hell's Gate fe07144871284371a5c31d710c3c2a4f
2023-05-28 11:50
-
89 Indirect Syscalls - HellsHall 94f45eeb837f4eb6829f55eb1d6c20dc
2023-05-28 11:50
-
77 Brute Force Decryption c467f2224963495388bded186d572805
2023-05-28 11:50
-
72 Anti-Debugging - Self-Deletion 97e7cad56b8d474b97988fb7c91703d5
2023-05-28 11:50
-
74 Anti-Virtual Environments - Multiple Delay Exec 1a52c1ea94be40948ad1a4b786...
2023-05-28 11:50
-
87 NTDLL Unhooking - From a Web Server d1bcc5c3167c43088e31dd211efded76
2023-05-28 11:50
-
82 Introduction To EDRs f4827eb5fb1d4d198d575a5ad670624c
2023-05-28 11:50
-
79 CRT Library Removal & Malware Compiling b216a9e9d29b4590896568ead8916d65
2023-05-28 11:50
-
13 Payload Placement - data & rdata Sections d402fbf89962436285694d655c54d6c3...
2023-05-28 11:49
24k
20 Evading Microsoft Defender Static Analysis ae933861119142d192c7c88c47e0c25...
2023-05-28 11:49
20k
23 Payload Obfuscation - UUIDFuscation 1c2f59cabc354005973cf3e7692586c7.html
2023-05-28 11:49
24k
18 Payload Encryption - RC4 ff80fad2bcc74e798b270bb1fddd1be2.html
2023-05-28 11:49
28k
15 Payload Placement - rsrc Section c6369f39745844c8af17d37db5a75eac.html
2023-05-28 11:49
28k
16 Introduction To Payload Encryption 090b0d4bea194239a37c73d3e3b9124f.html
2023-05-28 11:49
20k
22 Payload Obfuscation - MACFucscation 8acebc37c16548f2a0279babcac9f579.html
2023-05-28 11:49
24k
12 Undocumented Structures a1b1542a827d4ff2a42d99a97ef9e01d.html
2023-05-28 11:49
24k
19 Payload Encryption - AES Encryption fa2ab3c6213d4a12a1394be735833ec7.html
2023-05-28 11:49
52k
14 Payload Placement - text Section 7d566afd50194164979afb40c3c311f3.html
2023-05-28 11:49
20k
21 Payload Obfuscation - IPv4 IPv6Fuscation 9f7b77eecf01460d8d898195f70f4790....
2023-05-28 11:49
36k
17 Payload Encryption - XOR e07626c543ae4bc387b1936bee6fbc00.html
2023-05-28 11:49
20k
72 Anti-Debugging - Self-Deletion 97e7cad56b8d474b97988fb7c91703d5.html
2023-05-28 11:49
32k
70 Anti-Analysis - Introduction f00a576434474763babcbad9fb8b988c.html
2023-05-28 11:49
20k
84 NTDLL Unhooking - From Disk 8aeadeff47ae40f2bf190a32b0678f0a.html
2023-05-28 11:49
52k
82 Introduction To EDRs f4827eb5fb1d4d198d575a5ad670624c.html
2023-05-28 11:49
36k
51 String Hashing bda15d26efa8495790b4467721838661.html
2023-05-28 11:49
28k
91 Diving Into NtCreateUserProcess 9128d84d1c2f49939aeffccbc228565b.html
2023-05-28 11:49
68k
65 Syscalls - SysWhispers b0330e613e8f4441bb581226cf7412ea.html
2023-05-28 11:49
36k
50 Parsing PE Headers 7d60ebf31c744655b0a36dbbfcb8e9c1.html
2023-05-28 11:49
44k
27 Local Payload Execution - Shellcode e1f075df7aa84bcd8b475e875c589a9b.html
2023-05-28 11:49
36k
59 API Hooking - Detours Library b06d3c8c1d6040d886472493a5084f2c.html
2023-05-28 11:49
36k
60 API Hooking - Minhook Library c42628518a7f494495b8c3af9e5203f3.html
2023-05-28 11:49
28k
trick-or-treat-6474735-5349184.png
2023-05-28 11:49
132k
43 Remote Mapping Injection 268ba3a4ebcd42e8a6a99cf2c8eb88c2.html
2023-05-28 11:49
28k
25 Maldev Academy Tool - MiniShell 2e5e50eff60245dd81620925222710d4.html
2023-05-28 11:49
20k
74 Anti-Virtual Environments - Multiple Delay Exec 1a52c1ea94be40948ad1a4b786...
2023-05-28 11:49
28k
46 Payload Execution Control 169c1c943aed40e096a42d7b9761c466.html
2023-05-28 11:49
24k
49 Process Argument Spoofing (2) 0f4d524b53fa4b2b9d2b2a52376a158a.html
2023-05-28 11:49
24k
67 Syscalls - Reimplementing Classic Injection a51528df7b4045359976f170fab7b5...
2023-05-28 11:49
52k
28 Process Injection - DLL Injection 673245a70556420cb999c1f1cc2723a9.html
2023-05-28 11:49
40k
29 Process Injection - Shellcode Injection 462956fe40674d56baa665523f37bdf2.html
2023-05-28 11:49
28k
34 Process Enumeration - NtQuerySystemInformation 70484231965b41108520d9f7664...
2023-05-28 11:49
32k
michael-black-a5.jpg
2023-05-28 11:49
868k
53 IAT Hiding & Obfuscation - Custom GetProcAddres aa735dbf7a4e4c188c8b6e8f85...
2023-05-28 11:49
32k
69 Syscalls - Reimplementing APC Injection 4134d6cae4f8487384888ad519adc700.html
2023-05-28 11:49
36k
4 Coding Basics 2ff6d449157546238ba8c316b981337f.html
2023-05-28 11:49
24k
63 Syscalls - Introduction b8f710a9d1a64edeac1abd028752da3c.html
2023-05-28 11:49
28k
78 MalDev Academy Tool - KeyGuard 9ed61e52dac94108a2301370dbefb62a.html
2023-05-28 11:49
32k
37 Thread Hijacking - Local Thread Enumeration 0e5417dc3f844a68aa319deb6a376c...
2023-05-28 11:49
28k
85 NTDLL Unhooking - From KnownDlls Directory db89a0c0abe54a799e9816e7a223754...
2023-05-28 11:49
32k
8 Portable Executable Format a919d24f6aa94a2698766ef3f0bf5f21.html
2023-05-28 11:49
40k
44 Local Function Stomping Injection c935dd1a71c845059628b12d6c3cdcb8.html
2023-05-28 11:49
24k
55 IAT Hiding & Obfuscation - API Hashing 3fe6fb0cde7d41fdb7357575d7685be3.html
2023-05-28 11:49
28k
79 CRT Library Removal & Malware Compiling b216a9e9d29b4590896568ead8916d65.html
2023-05-28 11:49
48k
48 Process Argument Spoofing (1) b427dcafb59043239840f40c0ab8dc81.html
2023-05-28 11:49
36k
76 Binary Entropy Reduction e582eb6f4c64486f9a656a5b9e9d993b.html
2023-05-28 11:49
28k
33 Process Enumeration - EnumProcesses 68c6d61e1bea4011b331a89d300322f9.html
2023-05-28 11:49
28k
41 Callback Code Execution da849912e27f4bde9f88caaf4847aeb0.html
2023-05-28 11:49
28k
40 Early Bird APC Injection a9fb0ac0fc464b7c8a61de3fba4d7c8c.html
2023-05-28 11:49
24k
52 IAT Hiding & Obfuscation - Introduction 92083157ed3949938746858848e5ef9d.html
2023-05-28 11:49
20k
54 IAT Hiding & Obfuscation - Custom GetModuleHand 031d95fe35cc41edac2064756d...
2023-05-28 11:49
40k
58 API Hooking - Introduction b43ef4c2f27a4891a09b1ca65a4522fe.html
2023-05-28 11:49
20k
83 NTDLL Unhooking - Introduction e62fdd6d30884ac798da2ab3901442cc.html
2023-05-28 11:49
24k
90 Block DLL Policy cf46e560a7fc47bcbb2c0ad81f874be6.html
2023-05-28 11:49
32k
86 NTDLL Unhooking - From a Suspended Process b586e5f76b064f63a867c116853ff11...
2023-05-28 11:49
32k
24 Maldev Academy Tool - HellShell 1c00f7dd2c7547de89956f25a050ea22.html
2023-05-28 11:49
20k
47 Spoofing PPID 5f6b664165244f6284dd737c7e5d823c.html
2023-05-28 11:49
32k
80 IAT Camouflage b3a2763284464e8f92ccbb50130694b4.html
2023-05-28 11:49
28k
56 IAT Hiding & Obfuscation - Custom Pseudo Handle b9c801a007204fdfa5e888dc12...
2023-05-28 11:49
24k
68 Syscalls - Reimplementing Mapping Injection 2f2302d29c4b4300bc09befcc91e50...
2023-05-28 11:49
56k
39 APC Injection 86545b9163834568b0a197adc696666e.html
2023-05-28 11:49
28k
73 Anti-Virtual Environments - Multiple Techniques d3a43bd340604f059172e28fd6...
2023-05-28 11:49
36k
71 Anti-Debugging - Multiple Techniques 6e238e4d6c414f8f93da7cc5af419566.html
2023-05-28 11:49
44k
57 IAT Hiding & Obfuscation - Compile Time API Has af3ce62d28bb4e0a824b7e3a42...
2023-05-28 11:49
32k
45 Remote Function Stomping Injection d7942e1bc9af45968f6b7eea69b6559e.html
2023-05-28 11:49
24k
61 API Hooking - Custom Code 7e6302f71fe94f6786760d6f2b619236.html
2023-05-28 11:49
36k
89 Indirect Syscalls - HellsHall 94f45eeb837f4eb6829f55eb1d6c20dc.html
2023-05-28 11:49
44k
38 Thread Hijacking - Remote Thread Enumeration 0856586d8db7435fadc7ae2b918da...
2023-05-28 11:49
24k
77 Brute Force Decryption c467f2224963495388bded186d572805.html
2023-05-28 11:49
24k
64 Syscalls - Userland Hooking 874286351a4a4dc0a89d688487b2f698.html
2023-05-28 11:49
28k
88 Updating Hell's Gate fe07144871284371a5c31d710c3c2a4f.html
2023-05-28 11:49
56k
26 Local Payload Execution - DLL 047762d5d58a43308c08affcede128f9.html
2023-05-28 11:49
20k
62 API Hooking - Using Windows APIs f8ded5cdb10a45bfbadda982993d6bcf.html
2023-05-28 11:49
28k
81 Bypassing AVs c8b98ed828814f89b8db2d5ac5a9c230.html
2023-05-28 11:49
88k
35 Thread Hijacking - Local Thread Creation dfbe368a13a84ee793d9772723c40623....
2023-05-28 11:49
32k
32 Malware Binary Signing fe21c309a829423fa32229958b372dac.html
2023-05-28 11:49
24k
66 Syscalls - Hell's Gate d6268c1cdf0f4709ae05a196f475974b.html
2023-05-28 11:49
32k
36 Thread Hijacking - Remote Thread Creation 8810a50599cc4cb7a0915dadf5cabe29...
2023-05-28 11:49
32k
42 Local Mapping Injection a18ce0d426434c27b585cf1ddd825b70.html
2023-05-28 11:49
28k
75 Anti-Virtual Environments - API Hammering 65a79f843fa44243b4b53e9890141f43...
2023-05-28 11:49
28k
87 NTDLL Unhooking - From a Web Server d1bcc5c3167c43088e31dd211efded76.html
2023-05-28 11:49
36k
30 Payload Staging - Web Server eda456e5264144a5896120955cee9540.html
2023-05-28 11:49
36k
31 Payload Staging - Windows Registry e777de605e884adf970e64206c5d249f.html
2023-05-28 11:49
36k
1 Welcome Module 50a6834777ae4e8fa6f48331845a779e.html
2023-07-14 19:50
24k
2 Introduction To Malware Development 59fd7e6d7aee4b73ba2fbaf1fedc5f76.html
2023-07-14 20:00
32k
3 Required Tools 4fe7ff0b0d174fa5a6d1ce0fd98d3197.html
2023-07-14 20:04
28k
5 Windows Architecture 012cf6ad24cc4d18897cd9414c274997.html
2023-07-14 20:13
24k
6 Windows Memory Management 3de16d4bafa34eb19106dd2c5f0ff634.html
2023-07-14 21:04
36k
7 Introduction To The Windows API fe26cafbdf464e039dabea74013cf65d.html
2023-07-14 21:25
40k
9 Dynamic-Link Library 81450f1651f74297aa2208e1dc397a4b.html
2023-07-14 21:47
36k
10 Detection Mechanisms 8ac0fec121da4288a3f820552bfc3af0.html
2023-07-15 07:59
32k
11 Windows Processes c1d189721d41469b89798a788d0ac581.html
2023-07-15 08:13
36k
Proudly Served by LiteSpeed Web Server at steamcommunity.info Port 80