DarkCoderSc's profile picture. Security & Malware Researcher / Developer. Microsoft MVP

🇫🇷 🇵🇹 🇬🇧

Bluesky : darkcodersc

Jean-Pierre LESUEUR

@DarkCoderSc

Security & Malware Researcher / Developer. Microsoft MVP 🇫🇷 🇵🇹 🇬🇧 Bluesky : darkcodersc

🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com #InfoSec #Malware #DFIR

DarkCoderSc's tweet image. 🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com 

#InfoSec #Malware #DFIR

Remember, for the "veterans" among us, when we used to call those piece of arts "Trojans" (even though it wasn’t always accurate)? With the support and blessing of MegaRat (creator of Mega Security, now back online), I've launched malwaregallery.com/archive , a full reconstruction…

DarkCoderSc's tweet image. Remember, for the "veterans" among us, when we used to call those piece of arts "Trojans" (even though it wasn’t always accurate)? With the support and blessing of MegaRat (creator of Mega Security, now back online), I've launched malwaregallery.com/archive , a full reconstruction…

Just received my copy of « Evasive Malware » by Kyle Cucci (@d4rksystem) @nostarch ! If you're looking to deepen your understanding of malware evasion techniques, this book is a must-read. Can’t wait to dive into every single page! #malware #infosec #offsec

DarkCoderSc's tweet image. Just received my copy of « Evasive Malware » by Kyle Cucci (@d4rksystem) @nostarch ! If you're looking to deepen your understanding of malware evasion techniques, this book is a must-read. Can’t wait to dive into every single page!

#malware #infosec #offsec
DarkCoderSc's tweet image. Just received my copy of « Evasive Malware » by Kyle Cucci (@d4rksystem) @nostarch ! If you're looking to deepen your understanding of malware evasion techniques, this book is a must-read. Can’t wait to dive into every single page!

#malware #infosec #offsec

🚀This is a significant milestone for Arcane: I've successfully captured the secure desktop (auto desktop switching from default to winlogon) without the need for a separate process or third-party tool. This achievement requires the Arcane Server to run as the SYSTEM user, which…


The first version of Arcane, formerly known as PowerRemoteDesktop is now available. For those unfamiliar with the project, Arcane is a fully functional remote desktop server for Windows, entirely written in PowerShell. I've now migrated the viewer/client to Python with a…

DarkCoderSc's tweet image. The first version of Arcane, formerly known as PowerRemoteDesktop is now available. For those unfamiliar with the project, Arcane is a fully functional remote desktop server for Windows, entirely written in PowerShell. I've now migrated the viewer/client to Python with a…

DLest v3.0 has been released with numerous new features, including performance improvements, process spy (for debugging processes and listening for DLL load events), a file hashing tool, anonymous export function enumeration and an improved filtering system. If you are not yet…

DarkCoderSc's tweet image. DLest v3.0 has been released with numerous new features, including performance improvements, process spy (for debugging processes and listening for DLL load events), a file hashing tool, anonymous export function enumeration and an improved filtering system. If you are not yet…

🌟Pleased to announce the release of the second part of my Understanding Malware Patching series! This time, we talk about Application Resources as a malicious vector. The lengthy article is accompanied by a bonus project that demonstrates how a threat actor could leverage…

DarkCoderSc's tweet image. 🌟Pleased to announce the release of the second part of my Understanding Malware Patching series! This time, we talk about Application Resources as a malicious vector. The lengthy article is accompanied by a bonus project that demonstrates how a threat actor could leverage…

👽 A new technique, named "FuncIn", has been integrated to #UnprotectProject, showcasing a sophisticated evasion technique with a working open-source demo. In short, FuncIn employs a payload staging strategy, diverging from the conventional method where all malicious…

DarkCoderSc's tweet image. 👽 A new technique, named "FuncIn", has been integrated to #UnprotectProject, showcasing a sophisticated evasion technique with a working open-source demo. In short, FuncIn employs a payload staging strategy, diverging from the conventional method where all malicious…

In the past, our "Malware Retrospective" series has thrown light on some well-known Trojans like SubSeven and 👽 Beast, names that almost anyone in the Cyber Security field would recognize. However, today, we venture off the beaten path to look at a lesser-known yet highly…

DarkCoderSc's tweet image. In the past, our "Malware Retrospective" series has thrown light on some well-known Trojans like SubSeven and 👽 Beast, names that almost anyone in the Cyber Security field would recognize. However, today, we venture off the beaten path to look at a lesser-known yet highly…

🛸 Introducing "Malware Gallery" - A living museum of "trojan/malware's" most infamous masterpieces from past decades! Currently in BETA. The collection will grow over time (many) so stay tuned! Feedback & suggestions really appreciated! phrozen.io/malware-galler…

DarkCoderSc's tweet image. 🛸 Introducing "Malware Gallery" - A living museum of "trojan/malware's" most infamous masterpieces from past decades! Currently in BETA. The collection will grow over time (many) so stay tuned! Feedback & suggestions really appreciated!
phrozen.io/malware-galler…

Best Malware author comment so far 🤣 - Quoted from SubSeven 2.2 source code.

DarkCoderSc's tweet image. Best Malware author comment so far 🤣 - Quoted from SubSeven 2.2 source code.

Who remember or still use that old trick 😂 ?

DarkCoderSc's tweet image. Who remember or still use that old trick 😂 ?

🕵️Step into the world of #Malware history with my latest article! Uncover the secrets of #SubSeven, the game-changing Remote Access Trojan of the early 2000s. Hear from the elusive creator, Mobman, and discover how this software continues to inspire: darkcodersc.medium.com/a-malware-retr…

DarkCoderSc's tweet image. 🕵️Step into the world of #Malware history with my latest article! Uncover the secrets of #SubSeven, the game-changing Remote Access Trojan of the early 2000s. Hear from the elusive creator, Mobman, and discover how this software continues to inspire: darkcodersc.medium.com/a-malware-retr…

🛸👽 Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: github.com/DarkCoderSc/Sh… #InfoSec #Malware #Network #Evasion #FTP

DarkCoderSc's tweet image. 🛸👽 Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: github.com/DarkCoderSc/Sh…

#InfoSec #Malware #Network #Evasion #FTP

🚀 I just published the first article in my Malware retrospective series, kicking off with the notorious Beast RAT. Get ready for a deep dive into its history, impact, and legacy! Check it out here: medium.com/@darkcodersc/a… #Malware #InfoSec #cybersecurity #trojan

DarkCoderSc's tweet image. 🚀 I just published the first article in my Malware retrospective series, kicking off with the notorious Beast RAT. Get ready for a deep dive into its history, impact, and legacy! Check it out here: medium.com/@darkcodersc/a…

#Malware #InfoSec #cybersecurity #trojan

👽 Remember the infamous Beast Remote Access #Trojan from the early 2000s? I've recently had the privilege to talk with Tataye, its creator, to relive those thrilling times. Paper coming soon! In the meantime, explore the complete Beast 2.07 UI flowchart: phrozen.io/image/beast-20…

DarkCoderSc's tweet image. 👽 Remember the infamous Beast Remote Access #Trojan from the early 2000s? I've recently had the privilege to talk with Tataye, its creator, to relive those thrilling times. Paper coming soon! In the meantime, explore the complete Beast 2.07 UI flowchart: phrozen.io/image/beast-20…

Loading...

Something went wrong.


Something went wrong.