DarkCoder
@DarkCoder75
{ Malware Addict } C# Dev, Linux, SysAdmin CyberSecu https://cloudguardpro.com
Dit vind je misschien leuk
SQL for Python Developers: A Hands-On Guide to Data-Driven Applications amzn.to/4499nEi
🐉 Kali Linux Command Reference Sheet
Bypassing static analysis - Deep DivE lorenzomeacci.com/bypassing-stat…
SilentButDeadly - a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). github.com/loosehose/Sile…
🚨 Weaponized Putty & Teams Ads Deliver Malware, Allowing Hackers to Access Network Read more: cybersecuritynews.com/weaponized-put… An ongoing malicious advertising campaign is weaponizing legitimate software downloads to deploy OysterLoader malware, previously identified as Broomstick and…
Powershell for Hackers, Survival Edition: Part 4 hackers-arise.com/powershell-for…
Understanding the Windows PE Header and Section Table.
DLL Sideloading - OneDrive - Abusing version.dll reddit.com/r/blueteamsec/…
Lateral movement across server room? Steven Flores (@0xthirteen) of @SpecterOps describes a new fancy WMI class that can be used to move laterally between Windows server boxes. Also, mentions methods of extending this tactic to workstations. Post: specterops.io/blog/2025/09/1……
🖥 RAT + Crypter [SOURCE] 🔗 github.com/Quasar-Continu… 🔗 gitlab.com/KDot227/Poopsar 🔗 gitea.com/KDot227/Poopsar 🔗 codeberg.org/KDot227/Poopsar 🔗 github.com/Chainski/Panda…
You wanted more PowerShell ... so our video series with Andrew Prince continues! In today's video, Andrew Prince shows you how to detect indicators of compromise (IOCs) across a Windows network. Learn to detect telltale network signs of compromise, malware beacon activity,…
learn x86-64 assembly by writing a GUI from scratch
Australia warns of ‘BadCandy’ infections on unpatched Cisco devices - @billtoulas bleepingcomputer.com/news/security/…
Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks securityaffairs.com/184076/securit…
Will this Neo cloud provide access to high-end GPUs?
Top Hacking Gadgets
🔓 Hiding Processes by Unlinking Kernel EPROCESS Learn how you can manipulate the EPROCESS linked list to evade process enumeration and analysis. But watch out for patchguard! 👉 guidedhacking.com/threads/kernel…
7 Free resources to learn Linux & DevOps 1. Linux → linuxopsys.com 2. Bash → blog.sysxplore.com 3. AWS → explore.skillbuilder.aws 4. Azure → learn.microsoft.com 5. DevOps → edx.org/learn/devops 6. Docker → docker-curriculum.com 7. Kubernetes…
Windows RPC lateral movement quick reference for defenders. #ThreatHunting #DFIR
Intro to Malware Packers! - youtube.com/watch?v=9F8NVX…
youtube.com
YouTube
How to Unpack Malware: A Reverse Engineering Tutorial
United States Trends
- 1. #DWTS 17.6K posts
- 2. Elaine 10.2K posts
- 3. Kentucky 16.3K posts
- 4. ZAC EFRON 1,479 posts
- 5. #WWENXT 7,754 posts
- 6. Whitney 7,764 posts
- 7. Pope 27.9K posts
- 8. Dylan 19.1K posts
- 9. Carrie Ann 1,032 posts
- 10. #USMNT 2,483 posts
- 11. Alix 3,181 posts
- 12. Uruguay 24.8K posts
- 13. Michigan State 10.3K posts
- 14. Peggy 11.5K posts
- 15. #NXTGoldRush 6,287 posts
- 16. Caleb Wilson 1,139 posts
- 17. Derek 8,949 posts
- 18. Garrison 2,778 posts
- 19. Izzo 2,329 posts
- 20. Zaria 4,113 posts
Something went wrong.
Something went wrong.