Jean-Pierre LESUEUR
@DarkCoderSc
Security & Malware Researcher / Developer. Microsoft MVP 🇫🇷 🇵🇹 🇬🇧 Bluesky : darkcodersc
You might like
🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com #InfoSec #Malware #DFIR
Remember, for the "veterans" among us, when we used to call those piece of arts "Trojans" (even though it wasn’t always accurate)? With the support and blessing of MegaRat (creator of Mega Security, now back online), I've launched malwaregallery.com/archive , a full reconstruction…
Just received my copy of « Evasive Malware » by Kyle Cucci (@d4rksystem) @nostarch ! If you're looking to deepen your understanding of malware evasion techniques, this book is a must-read. Can’t wait to dive into every single page! #malware #infosec #offsec
🚀This is a significant milestone for Arcane: I've successfully captured the secure desktop (auto desktop switching from default to winlogon) without the need for a separate process or third-party tool. This achievement requires the Arcane Server to run as the SYSTEM user, which…
The first version of Arcane, formerly known as PowerRemoteDesktop is now available. For those unfamiliar with the project, Arcane is a fully functional remote desktop server for Windows, entirely written in PowerShell. I've now migrated the viewer/client to Python with a…
DLest v3.0 has been released with numerous new features, including performance improvements, process spy (for debugging processes and listening for DLL load events), a file hashing tool, anonymous export function enumeration and an improved filtering system. If you are not yet…
🌟Pleased to announce the release of the second part of my Understanding Malware Patching series! This time, we talk about Application Resources as a malicious vector. The lengthy article is accompanied by a bonus project that demonstrates how a threat actor could leverage…
👽 A new technique, named "FuncIn", has been integrated to #UnprotectProject, showcasing a sophisticated evasion technique with a working open-source demo. In short, FuncIn employs a payload staging strategy, diverging from the conventional method where all malicious…
In the past, our "Malware Retrospective" series has thrown light on some well-known Trojans like SubSeven and 👽 Beast, names that almost anyone in the Cyber Security field would recognize. However, today, we venture off the beaten path to look at a lesser-known yet highly…
🛸 Introducing "Malware Gallery" - A living museum of "trojan/malware's" most infamous masterpieces from past decades! Currently in BETA. The collection will grow over time (many) so stay tuned! Feedback & suggestions really appreciated! phrozen.io/malware-galler…
Best Malware author comment so far 🤣 - Quoted from SubSeven 2.2 source code.
Who remember or still use that old trick 😂 ?
🕵️Step into the world of #Malware history with my latest article! Uncover the secrets of #SubSeven, the game-changing Remote Access Trojan of the early 2000s. Hear from the elusive creator, Mobman, and discover how this software continues to inspire: darkcodersc.medium.com/a-malware-retr…
🛸👽 Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: github.com/DarkCoderSc/Sh… #InfoSec #Malware #Network #Evasion #FTP
🚀 I just published the first article in my Malware retrospective series, kicking off with the notorious Beast RAT. Get ready for a deep dive into its history, impact, and legacy! Check it out here: medium.com/@darkcodersc/a… #Malware #InfoSec #cybersecurity #trojan
👽 Remember the infamous Beast Remote Access #Trojan from the early 2000s? I've recently had the privilege to talk with Tataye, its creator, to relive those thrilling times. Paper coming soon! In the meantime, explore the complete Beast 2.07 UI flowchart: phrozen.io/image/beast-20…
🌟 As requested, the #SubSeven Legacy service source code has been released to the official repository: github.com/DarkCoderSc/Su…. The project is now entirely open-source.
github.com
GitHub - DarkCoderSc/SubSeven: SubSeven Legacy Official Source Code Repository
SubSeven Legacy Official Source Code Repository. Contribute to DarkCoderSc/SubSeven development by creating an account on GitHub.
United States Trends
- 1. The BONK 40.4K posts
- 2. FINALLY DID IT 315K posts
- 3. Jalen 74K posts
- 4. Eagles 117K posts
- 5. Chargers 85K posts
- 6. Herbert 33.4K posts
- 7. AJ Brown 10.2K posts
- 8. Piers 82.9K posts
- 9. #BoltUp 4,650 posts
- 10. #WWERaw 50.3K posts
- 11. Tony Jefferson 3,092 posts
- 12. Saquon 11.5K posts
- 13. Cameron Dicker 1,931 posts
- 14. Sirianni 5,677 posts
- 15. Patullo 7,019 posts
- 16. LA Knight 10.7K posts
- 17. #Dragula N/A
- 18. 4 INTs 3,529 posts
- 19. Cam Hart 1,384 posts
- 20. Fuentes 117K posts
You might like
-
/r/netsec
@_r_netsec -
d1rkmtr
@d1rkmtr -
Kuba Gretzky
@mrgretzky -
Alice Climent
@AliceCliment -
Zero-Point Security
@_ZeroPointSec -
Swissky
@pentest_swissky -
an0n
@an0n_r0 -
Kyle Cucci
@d4rksystem -
Josh
@passthehashbrwn -
Outflank
@OutflankNL -
Ivan Kwiatkowski
@JusticeRage -
Thomas Roccia 🤘
@fr0gger_ -
BC Security
@bcsecurity -
Karsten Hahn
@struppigel -
SEKTOR7 Institute
@SEKTOR7net
Something went wrong.
Something went wrong.