Index of /MALWARE 8b74ccffb7e64efea30e3da4d919418d/

NameLast ModifiedSize
UpParent Directory
Directory63 Syscalls - Introduction b8f710a9d1a64edeac1abd028752da3c2023-05-28 11:49-
Directory52 IAT Hiding & Obfuscation - Introduction 92083157ed3949938746858848e5ef9d2023-05-28 11:49-
Directory10 Detection Mechanisms 8ac0fec121da4288a3f820552bfc3af02023-05-28 11:49-
Directory49 Process Argument Spoofing (2) 0f4d524b53fa4b2b9d2b2a52376a158a2023-05-28 11:49-
Directory38 Thread Hijacking - Remote Thread Enumeration 0856586d8db7435fadc7ae2b918da7b22023-05-28 11:49-
Directory28 Process Injection - DLL Injection 673245a70556420cb999c1f1cc2723a92023-05-28 11:49-
Directory60 API Hooking - Minhook Library c42628518a7f494495b8c3af9e5203f32023-05-28 11:49-
Directory37 Thread Hijacking - Local Thread Enumeration 0e5417dc3f844a68aa319deb6a376ce92023-05-28 11:49-
Directory34 Process Enumeration - NtQuerySystemInformation 70484231965b41108520d9f7664...2023-05-28 11:49-
Directory47 Spoofing PPID 5f6b664165244f6284dd737c7e5d823c2023-05-28 11:49-
Directory20 Evading Microsoft Defender Static Analysis ae933861119142d192c7c88c47e0c2562023-05-28 11:49-
Directory22 Payload Obfuscation - MACFucscation 8acebc37c16548f2a0279babcac9f5792023-05-28 11:49-
Directory23 Payload Obfuscation - UUIDFuscation 1c2f59cabc354005973cf3e7692586c72023-05-28 11:49-
Directory57 IAT Hiding & Obfuscation - Compile Time API Has af3ce62d28bb4e0a824b7e3a42...2023-05-28 11:49-
Directory40 Early Bird APC Injection a9fb0ac0fc464b7c8a61de3fba4d7c8c2023-05-28 11:49-
Directory25 Maldev Academy Tool - MiniShell 2e5e50eff60245dd81620925222710d42023-05-28 11:49-
Directory35 Thread Hijacking - Local Thread Creation dfbe368a13a84ee793d9772723c406232023-05-28 11:49-
Directory58 API Hooking - Introduction b43ef4c2f27a4891a09b1ca65a4522fe2023-05-28 11:49-
Directory51 String Hashing bda15d26efa8495790b44677218386612023-05-28 11:49-
Directory29 Process Injection - Shellcode Injection 462956fe40674d56baa665523f37bdf22023-05-28 11:49-
Directory59 API Hooking - Detours Library b06d3c8c1d6040d886472493a5084f2c2023-05-28 11:49-
Directory13 Payload Placement - data & rdata Sections d402fbf89962436285694d655c54d6c32023-05-28 11:49-
Directory21 Payload Obfuscation - IPv4 IPv6Fuscation 9f7b77eecf01460d8d898195f70f47902023-05-28 11:49-
Directory64 Syscalls - Userland Hooking 874286351a4a4dc0a89d688487b2f6982023-05-28 11:49-
Directory24 Maldev Academy Tool - HellShell 1c00f7dd2c7547de89956f25a050ea222023-05-28 11:49-
Directory48 Process Argument Spoofing (1) b427dcafb59043239840f40c0ab8dc812023-05-28 11:49-
Directory42 Local Mapping Injection a18ce0d426434c27b585cf1ddd825b702023-05-28 11:49-
Directory56 IAT Hiding & Obfuscation - Custom Pseudo Handle b9c801a007204fdfa5e888dc12...2023-05-28 11:49-
Directory26 Local Payload Execution - DLL 047762d5d58a43308c08affcede128f92023-05-28 11:49-
Directory5 Windows Architecture 012cf6ad24cc4d18897cd9414c2749972023-05-28 11:49-
Directory15 Payload Placement - rsrc Section c6369f39745844c8af17d37db5a75eac2023-05-28 11:49-
Directory32 Malware Binary Signing fe21c309a829423fa32229958b372dac2023-05-28 11:49-
Directory6 Windows Memory Management 3de16d4bafa34eb19106dd2c5f0ff6342023-05-28 11:49-
Directory31 Payload Staging - Windows Registry e777de605e884adf970e64206c5d249f2023-05-28 11:49-
Directory33 Process Enumeration - EnumProcesses 68c6d61e1bea4011b331a89d300322f92023-05-28 11:49-
Directory55 IAT Hiding & Obfuscation - API Hashing 3fe6fb0cde7d41fdb7357575d7685be32023-05-28 11:49-
Directory43 Remote Mapping Injection 268ba3a4ebcd42e8a6a99cf2c8eb88c22023-05-28 11:49-
Directory27 Local Payload Execution - Shellcode e1f075df7aa84bcd8b475e875c589a9b2023-05-28 11:49-
Directory36 Thread Hijacking - Remote Thread Creation 8810a50599cc4cb7a0915dadf5cabe292023-05-28 11:49-
Directory46 Payload Execution Control 169c1c943aed40e096a42d7b9761c4662023-05-28 11:49-
Directory50 Parsing PE Headers 7d60ebf31c744655b0a36dbbfcb8e9c12023-05-28 11:49-
Directory19 Payload Encryption - AES Encryption fa2ab3c6213d4a12a1394be735833ec72023-05-28 11:49-
Directory14 Payload Placement - text Section 7d566afd50194164979afb40c3c311f32023-05-28 11:49-
Directory44 Local Function Stomping Injection c935dd1a71c845059628b12d6c3cdcb82023-05-28 11:49-
Directory62 API Hooking - Using Windows APIs f8ded5cdb10a45bfbadda982993d6bcf2023-05-28 11:49-
Directory3 Required Tools 4fe7ff0b0d174fa5a6d1ce0fd98d31972023-05-28 11:49-
Directory39 APC Injection 86545b9163834568b0a197adc696666e2023-05-28 11:49-
Directory53 IAT Hiding & Obfuscation - Custom GetProcAddres aa735dbf7a4e4c188c8b6e8f85...2023-05-28 11:49-
Directory54 IAT Hiding & Obfuscation - Custom GetModuleHand 031d95fe35cc41edac2064756d...2023-05-28 11:49-
Directory30 Payload Staging - Web Server eda456e5264144a5896120955cee95402023-05-28 11:49-
Directory45 Remote Function Stomping Injection d7942e1bc9af45968f6b7eea69b6559e2023-05-28 11:49-
Directory12 Undocumented Structures a1b1542a827d4ff2a42d99a97ef9e01d2023-05-28 11:49-
Directory61 API Hooking - Custom Code 7e6302f71fe94f6786760d6f2b6192362023-05-28 11:49-
Directory90 Block DLL Policy cf46e560a7fc47bcbb2c0ad81f874be62023-05-28 11:50-
Directory78 MalDev Academy Tool - KeyGuard 9ed61e52dac94108a2301370dbefb62a2023-05-28 11:50-
Directory91 Diving Into NtCreateUserProcess 9128d84d1c2f49939aeffccbc228565b2023-05-28 11:50-
Directory85 NTDLL Unhooking - From KnownDlls Directory db89a0c0abe54a799e9816e7a22375462023-05-28 11:50-
Directory68 Syscalls - Reimplementing Mapping Injection 2f2302d29c4b4300bc09befcc91e503c2023-05-28 11:50-
Directory76 Binary Entropy Reduction e582eb6f4c64486f9a656a5b9e9d993b2023-05-28 11:50-
Directory9 Dynamic-Link Library 81450f1651f74297aa2208e1dc397a4b2023-05-28 11:50-
Directory65 Syscalls - SysWhispers b0330e613e8f4441bb581226cf7412ea2023-05-28 11:50-
Directory8 Portable Executable Format a919d24f6aa94a2698766ef3f0bf5f212023-05-28 11:50-
Directory80 IAT Camouflage b3a2763284464e8f92ccbb50130694b42023-05-28 11:50-
Directory84 NTDLL Unhooking - From Disk 8aeadeff47ae40f2bf190a32b0678f0a2023-05-28 11:50-
Directory81 Bypassing AVs c8b98ed828814f89b8db2d5ac5a9c2302023-05-28 11:50-
Directory69 Syscalls - Reimplementing APC Injection 4134d6cae4f8487384888ad519adc7002023-05-28 11:50-
Directory71 Anti-Debugging - Multiple Techniques 6e238e4d6c414f8f93da7cc5af4195662023-05-28 11:50-
Directory75 Anti-Virtual Environments - API Hammering 65a79f843fa44243b4b53e9890141f432023-05-28 11:50-
Directory67 Syscalls - Reimplementing Classic Injection a51528df7b4045359976f170fab7b5ef2023-05-28 11:50-
Directory83 NTDLL Unhooking - Introduction e62fdd6d30884ac798da2ab3901442cc2023-05-28 11:50-
Directory66 Syscalls - Hell's Gate d6268c1cdf0f4709ae05a196f475974b2023-05-28 11:50-
Directory86 NTDLL Unhooking - From a Suspended Process b586e5f76b064f63a867c116853ff11a2023-05-28 11:50-
Directory88 Updating Hell's Gate fe07144871284371a5c31d710c3c2a4f2023-05-28 11:50-
Directory89 Indirect Syscalls - HellsHall 94f45eeb837f4eb6829f55eb1d6c20dc2023-05-28 11:50-
Directory77 Brute Force Decryption c467f2224963495388bded186d5728052023-05-28 11:50-
Directory72 Anti-Debugging - Self-Deletion 97e7cad56b8d474b97988fb7c91703d52023-05-28 11:50-
Directory74 Anti-Virtual Environments - Multiple Delay Exec 1a52c1ea94be40948ad1a4b786...2023-05-28 11:50-
Directory87 NTDLL Unhooking - From a Web Server d1bcc5c3167c43088e31dd211efded762023-05-28 11:50-
Directory82 Introduction To EDRs f4827eb5fb1d4d198d575a5ad670624c2023-05-28 11:50-
Directory79 CRT Library Removal & Malware Compiling b216a9e9d29b4590896568ead8916d652023-05-28 11:50-
[TXT]13 Payload Placement - data & rdata Sections d402fbf89962436285694d655c54d6c3...2023-05-28 11:49 24k
[TXT]20 Evading Microsoft Defender Static Analysis ae933861119142d192c7c88c47e0c25...2023-05-28 11:49 20k
[TXT]23 Payload Obfuscation - UUIDFuscation 1c2f59cabc354005973cf3e7692586c7.html2023-05-28 11:49 24k
[TXT]18 Payload Encryption - RC4 ff80fad2bcc74e798b270bb1fddd1be2.html2023-05-28 11:49 28k
[TXT]15 Payload Placement - rsrc Section c6369f39745844c8af17d37db5a75eac.html2023-05-28 11:49 28k
[TXT]16 Introduction To Payload Encryption 090b0d4bea194239a37c73d3e3b9124f.html2023-05-28 11:49 20k
[TXT]22 Payload Obfuscation - MACFucscation 8acebc37c16548f2a0279babcac9f579.html2023-05-28 11:49 24k
[TXT]12 Undocumented Structures a1b1542a827d4ff2a42d99a97ef9e01d.html2023-05-28 11:49 24k
[TXT]19 Payload Encryption - AES Encryption fa2ab3c6213d4a12a1394be735833ec7.html2023-05-28 11:49 52k
[TXT]14 Payload Placement - text Section 7d566afd50194164979afb40c3c311f3.html2023-05-28 11:49 20k
[TXT]21 Payload Obfuscation - IPv4 IPv6Fuscation 9f7b77eecf01460d8d898195f70f4790....2023-05-28 11:49 36k
[TXT]17 Payload Encryption - XOR e07626c543ae4bc387b1936bee6fbc00.html2023-05-28 11:49 20k
[TXT]72 Anti-Debugging - Self-Deletion 97e7cad56b8d474b97988fb7c91703d5.html2023-05-28 11:49 32k
[TXT]70 Anti-Analysis - Introduction f00a576434474763babcbad9fb8b988c.html2023-05-28 11:49 20k
[TXT]84 NTDLL Unhooking - From Disk 8aeadeff47ae40f2bf190a32b0678f0a.html2023-05-28 11:49 52k
[TXT]82 Introduction To EDRs f4827eb5fb1d4d198d575a5ad670624c.html2023-05-28 11:49 36k
[TXT]51 String Hashing bda15d26efa8495790b4467721838661.html2023-05-28 11:49 28k
[TXT]91 Diving Into NtCreateUserProcess 9128d84d1c2f49939aeffccbc228565b.html2023-05-28 11:49 68k
[TXT]65 Syscalls - SysWhispers b0330e613e8f4441bb581226cf7412ea.html2023-05-28 11:49 36k
[TXT]50 Parsing PE Headers 7d60ebf31c744655b0a36dbbfcb8e9c1.html2023-05-28 11:49 44k
[TXT]27 Local Payload Execution - Shellcode e1f075df7aa84bcd8b475e875c589a9b.html2023-05-28 11:49 36k
[TXT]59 API Hooking - Detours Library b06d3c8c1d6040d886472493a5084f2c.html2023-05-28 11:49 36k
[TXT]60 API Hooking - Minhook Library c42628518a7f494495b8c3af9e5203f3.html2023-05-28 11:49 28k
[IMG]trick-or-treat-6474735-5349184.png2023-05-28 11:49 132k
[TXT]43 Remote Mapping Injection 268ba3a4ebcd42e8a6a99cf2c8eb88c2.html2023-05-28 11:49 28k
[TXT]25 Maldev Academy Tool - MiniShell 2e5e50eff60245dd81620925222710d4.html2023-05-28 11:49 20k
[TXT]74 Anti-Virtual Environments - Multiple Delay Exec 1a52c1ea94be40948ad1a4b786...2023-05-28 11:49 28k
[TXT]46 Payload Execution Control 169c1c943aed40e096a42d7b9761c466.html2023-05-28 11:49 24k
[TXT]49 Process Argument Spoofing (2) 0f4d524b53fa4b2b9d2b2a52376a158a.html2023-05-28 11:49 24k
[TXT]67 Syscalls - Reimplementing Classic Injection a51528df7b4045359976f170fab7b5...2023-05-28 11:49 52k
[TXT]28 Process Injection - DLL Injection 673245a70556420cb999c1f1cc2723a9.html2023-05-28 11:49 40k
[TXT]29 Process Injection - Shellcode Injection 462956fe40674d56baa665523f37bdf2.html2023-05-28 11:49 28k
[TXT]34 Process Enumeration - NtQuerySystemInformation 70484231965b41108520d9f7664...2023-05-28 11:49 32k
[IMG]michael-black-a5.jpg2023-05-28 11:49 868k
[TXT]53 IAT Hiding & Obfuscation - Custom GetProcAddres aa735dbf7a4e4c188c8b6e8f85...2023-05-28 11:49 32k
[TXT]69 Syscalls - Reimplementing APC Injection 4134d6cae4f8487384888ad519adc700.html2023-05-28 11:49 36k
[TXT]4 Coding Basics 2ff6d449157546238ba8c316b981337f.html2023-05-28 11:49 24k
[TXT]63 Syscalls - Introduction b8f710a9d1a64edeac1abd028752da3c.html2023-05-28 11:49 28k
[TXT]78 MalDev Academy Tool - KeyGuard 9ed61e52dac94108a2301370dbefb62a.html2023-05-28 11:49 32k
[TXT]37 Thread Hijacking - Local Thread Enumeration 0e5417dc3f844a68aa319deb6a376c...2023-05-28 11:49 28k
[TXT]85 NTDLL Unhooking - From KnownDlls Directory db89a0c0abe54a799e9816e7a223754...2023-05-28 11:49 32k
[TXT]8 Portable Executable Format a919d24f6aa94a2698766ef3f0bf5f21.html2023-05-28 11:49 40k
[TXT]44 Local Function Stomping Injection c935dd1a71c845059628b12d6c3cdcb8.html2023-05-28 11:49 24k
[TXT]55 IAT Hiding & Obfuscation - API Hashing 3fe6fb0cde7d41fdb7357575d7685be3.html2023-05-28 11:49 28k
[TXT]79 CRT Library Removal & Malware Compiling b216a9e9d29b4590896568ead8916d65.html2023-05-28 11:49 48k
[TXT]48 Process Argument Spoofing (1) b427dcafb59043239840f40c0ab8dc81.html2023-05-28 11:49 36k
[TXT]76 Binary Entropy Reduction e582eb6f4c64486f9a656a5b9e9d993b.html2023-05-28 11:49 28k
[TXT]33 Process Enumeration - EnumProcesses 68c6d61e1bea4011b331a89d300322f9.html2023-05-28 11:49 28k
[TXT]41 Callback Code Execution da849912e27f4bde9f88caaf4847aeb0.html2023-05-28 11:49 28k
[TXT]40 Early Bird APC Injection a9fb0ac0fc464b7c8a61de3fba4d7c8c.html2023-05-28 11:49 24k
[TXT]52 IAT Hiding & Obfuscation - Introduction 92083157ed3949938746858848e5ef9d.html2023-05-28 11:49 20k
[TXT]54 IAT Hiding & Obfuscation - Custom GetModuleHand 031d95fe35cc41edac2064756d...2023-05-28 11:49 40k
[TXT]58 API Hooking - Introduction b43ef4c2f27a4891a09b1ca65a4522fe.html2023-05-28 11:49 20k
[TXT]83 NTDLL Unhooking - Introduction e62fdd6d30884ac798da2ab3901442cc.html2023-05-28 11:49 24k
[TXT]90 Block DLL Policy cf46e560a7fc47bcbb2c0ad81f874be6.html2023-05-28 11:49 32k
[TXT]86 NTDLL Unhooking - From a Suspended Process b586e5f76b064f63a867c116853ff11...2023-05-28 11:49 32k
[TXT]24 Maldev Academy Tool - HellShell 1c00f7dd2c7547de89956f25a050ea22.html2023-05-28 11:49 20k
[TXT]47 Spoofing PPID 5f6b664165244f6284dd737c7e5d823c.html2023-05-28 11:49 32k
[TXT]80 IAT Camouflage b3a2763284464e8f92ccbb50130694b4.html2023-05-28 11:49 28k
[TXT]56 IAT Hiding & Obfuscation - Custom Pseudo Handle b9c801a007204fdfa5e888dc12...2023-05-28 11:49 24k
[TXT]68 Syscalls - Reimplementing Mapping Injection 2f2302d29c4b4300bc09befcc91e50...2023-05-28 11:49 56k
[TXT]39 APC Injection 86545b9163834568b0a197adc696666e.html2023-05-28 11:49 28k
[TXT]73 Anti-Virtual Environments - Multiple Techniques d3a43bd340604f059172e28fd6...2023-05-28 11:49 36k
[TXT]71 Anti-Debugging - Multiple Techniques 6e238e4d6c414f8f93da7cc5af419566.html2023-05-28 11:49 44k
[TXT]57 IAT Hiding & Obfuscation - Compile Time API Has af3ce62d28bb4e0a824b7e3a42...2023-05-28 11:49 32k
[TXT]45 Remote Function Stomping Injection d7942e1bc9af45968f6b7eea69b6559e.html2023-05-28 11:49 24k
[TXT]61 API Hooking - Custom Code 7e6302f71fe94f6786760d6f2b619236.html2023-05-28 11:49 36k
[TXT]89 Indirect Syscalls - HellsHall 94f45eeb837f4eb6829f55eb1d6c20dc.html2023-05-28 11:49 44k
[TXT]38 Thread Hijacking - Remote Thread Enumeration 0856586d8db7435fadc7ae2b918da...2023-05-28 11:49 24k
[TXT]77 Brute Force Decryption c467f2224963495388bded186d572805.html2023-05-28 11:49 24k
[TXT]64 Syscalls - Userland Hooking 874286351a4a4dc0a89d688487b2f698.html2023-05-28 11:49 28k
[TXT]88 Updating Hell's Gate fe07144871284371a5c31d710c3c2a4f.html2023-05-28 11:49 56k
[TXT]26 Local Payload Execution - DLL 047762d5d58a43308c08affcede128f9.html2023-05-28 11:49 20k
[TXT]62 API Hooking - Using Windows APIs f8ded5cdb10a45bfbadda982993d6bcf.html2023-05-28 11:49 28k
[TXT]81 Bypassing AVs c8b98ed828814f89b8db2d5ac5a9c230.html2023-05-28 11:49 88k
[TXT]35 Thread Hijacking - Local Thread Creation dfbe368a13a84ee793d9772723c40623....2023-05-28 11:49 32k
[TXT]32 Malware Binary Signing fe21c309a829423fa32229958b372dac.html2023-05-28 11:49 24k
[TXT]66 Syscalls - Hell's Gate d6268c1cdf0f4709ae05a196f475974b.html2023-05-28 11:49 32k
[TXT]36 Thread Hijacking - Remote Thread Creation 8810a50599cc4cb7a0915dadf5cabe29...2023-05-28 11:49 32k
[TXT]42 Local Mapping Injection a18ce0d426434c27b585cf1ddd825b70.html2023-05-28 11:49 28k
[TXT]75 Anti-Virtual Environments - API Hammering 65a79f843fa44243b4b53e9890141f43...2023-05-28 11:49 28k
[TXT]87 NTDLL Unhooking - From a Web Server d1bcc5c3167c43088e31dd211efded76.html2023-05-28 11:49 36k
[TXT]30 Payload Staging - Web Server eda456e5264144a5896120955cee9540.html2023-05-28 11:49 36k
[TXT]31 Payload Staging - Windows Registry e777de605e884adf970e64206c5d249f.html2023-05-28 11:49 36k
[TXT]1 Welcome Module 50a6834777ae4e8fa6f48331845a779e.html2023-07-14 19:50 24k
[TXT]2 Introduction To Malware Development 59fd7e6d7aee4b73ba2fbaf1fedc5f76.html2023-07-14 20:00 32k
[TXT]3 Required Tools 4fe7ff0b0d174fa5a6d1ce0fd98d3197.html2023-07-14 20:04 28k
[TXT]5 Windows Architecture 012cf6ad24cc4d18897cd9414c274997.html2023-07-14 20:13 24k
[TXT]6 Windows Memory Management 3de16d4bafa34eb19106dd2c5f0ff634.html2023-07-14 21:04 36k
[TXT]7 Introduction To The Windows API fe26cafbdf464e039dabea74013cf65d.html2023-07-14 21:25 40k
[TXT]9 Dynamic-Link Library 81450f1651f74297aa2208e1dc397a4b.html2023-07-14 21:47 36k
[TXT]10 Detection Mechanisms 8ac0fec121da4288a3f820552bfc3af0.html2023-07-15 07:59 32k
[TXT]11 Windows Processes c1d189721d41469b89798a788d0ac581.html2023-07-15 08:13 36k
Proudly Served by LiteSpeed Web Server at steamcommunity.info Port 80