#malwaredevelopment ผลการค้นหา

I bring a bit of good news: People are getting better at spotting malware 🥳 (That’s the malicious software cyber criminals use to break into systems, steal data, or lock up your files for ransom.) A new study found that, when tested, participants correctly spotted suspicious s

AlanMcBurney's tweet image. I bring a bit of good news: People are getting better at spotting malware 🥳

(That’s the malicious software cyber criminals use to break into systems, steal data, or lock up your files for ransom.)

A new study found that, when tested, participants correctly spotted suspicious s

Repo Leak — 610 hacking tools: #TrojanRat(310), #Ransomware(7), #Crypter(72), #Miner(9), Worm(8), #Botnet(25), VirusBuilder(9), #Binder(25), #Exploit(7), #Keylogger/#Stealer(40) and more . For #Malware analysts — caution. github[.]com/hktkqwe123/All-Hacking-Tools

cyberfeeddigest's tweet image. Repo Leak — 610 hacking tools: 

#TrojanRat(310), #Ransomware(7), #Crypter(72), #Miner(9), Worm(8), #Botnet(25), VirusBuilder(9), #Binder(25), #Exploit(7), #Keylogger/#Stealer(40) and more . For #Malware analysts — caution. 

github[.]com/hktkqwe123/All-Hacking-Tools

Implementing a custom bootkit for Windows Sandbox exploration. An excellent post by Dylan Goods (@sdoogm) and Duncan Ogilvie (@mrexodia). Source: secret.club/2022/08/29/boo… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Implementing a custom bootkit for Windows Sandbox exploration.

An excellent post by Dylan Goods (@sdoogm) and Duncan Ogilvie (@mrexodia).

Source: secret.club/2022/08/29/boo…

#redteam #maldev #malwaredevelopment

Malware is using AI to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware

lukOlejnik's tweet image. Malware is using AI to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware
lukOlejnik's tweet image. Malware is using AI to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware
lukOlejnik's tweet image. Malware is using AI to dynamically generate malicious scripts, obfuscate their own code to evade detection, and leverage AI models to create malicious functions on demand, rather than hard-coding them into the malware

Morphing shellcode during execution. Once a part of code is done executing, overwrite the block with new code to run. A proof of concept by Debjeet Banerjee (@whokilleddb) Src: github.com/whokilleddb/lo… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Morphing shellcode during execution.

Once a part of code is done executing, overwrite the block with new code to run.

A proof of concept by Debjeet Banerjee (@whokilleddb)

Src: github.com/whokilleddb/lo…

#redteam #maldev #malwaredevelopment
SEKTOR7net's tweet image. Morphing shellcode during execution.

Once a part of code is done executing, overwrite the block with new code to run.

A proof of concept by Debjeet Banerjee (@whokilleddb)

Src: github.com/whokilleddb/lo…

#redteam #maldev #malwaredevelopment

👀 OpenSource Malware an open database for tracking malicious open-source packages from npm, PyPI, GitHub repos! Great source of intel feed for supply-chain attacks! 👇 opensourcemalware.com

fr0gger_'s tweet image. 👀 OpenSource Malware an open database for tracking malicious open-source packages  from npm, PyPI, GitHub repos!

Great source of intel feed for supply-chain attacks! 👇

opensourcemalware.com

In malware analysis, the focus is on binaries and their details (C2, persistence, injections/hooking, anti-forensics techniques). On the other hand, maldocs are trivially simple to solve and most of them take 5 minutes or less to collect information. Don't waste time. #malware

ale_sp_brazil's tweet image. In malware analysis, the focus is on binaries and their details (C2, persistence, injections/hooking, anti-forensics techniques). On the other hand, maldocs are trivially simple to solve and most of them take 5 minutes or less to collect information. Don't waste time.

#malware
ale_sp_brazil's tweet image. In malware analysis, the focus is on binaries and their details (C2, persistence, injections/hooking, anti-forensics techniques). On the other hand, maldocs are trivially simple to solve and most of them take 5 minutes or less to collect information. Don't waste time.

#malware
ale_sp_brazil's tweet image. In malware analysis, the focus is on binaries and their details (C2, persistence, injections/hooking, anti-forensics techniques). On the other hand, maldocs are trivially simple to solve and most of them take 5 minutes or less to collect information. Don't waste time.

#malware
ale_sp_brazil's tweet image. In malware analysis, the focus is on binaries and their details (C2, persistence, injections/hooking, anti-forensics techniques). On the other hand, maldocs are trivially simple to solve and most of them take 5 minutes or less to collect information. Don't waste time.

#malware

MALWARE DEVELOPMENT WE DEVELOPED AND INFO STEALER BYPASS WINDOW DEFENDER Screen capture File system Access Keystrokes logging Camera access Cookies and authentication collector


Malware and Exploitdev Resources: This document serves as a list of resources, and other things that aid in malware analysis/dev and exploit dev github.com/evilbuffer/mal… #cybersecurity #hacking #malware #exploit

0xAsm0d3us's tweet image. Malware and Exploitdev Resources: This document serves as a list of resources, and other things that aid in malware analysis/dev and exploit dev

github.com/evilbuffer/mal…

#cybersecurity #hacking #malware #exploit

A curated list of awesome malware analysis tools and resources. github.com/rshipp/awesome… #malware #reversing #hacking #cybersecurity

0xAsm0d3us's tweet image. A curated list of awesome malware analysis tools and resources.

github.com/rshipp/awesome…

#malware #reversing #hacking #cybersecurity

Finally: Malwoverview 2.0 (in Python 3.x) is available! github.com/alexandreborge… There're so many news, so it's better to check on the GitHub ;) #malware #threatintelligence #threathunting #security

ale_sp_brazil's tweet image. Finally: Malwoverview 2.0 (in Python 3.x) is available! 

github.com/alexandreborge…

There're so many news, so it's better to check on the GitHub ;)

#malware #threatintelligence #threathunting #security
ale_sp_brazil's tweet image. Finally: Malwoverview 2.0 (in Python 3.x) is available! 

github.com/alexandreborge…

There're so many news, so it's better to check on the GitHub ;)

#malware #threatintelligence #threathunting #security
ale_sp_brazil's tweet image. Finally: Malwoverview 2.0 (in Python 3.x) is available! 

github.com/alexandreborge…

There're so many news, so it's better to check on the GitHub ;)

#malware #threatintelligence #threathunting #security
ale_sp_brazil's tweet image. Finally: Malwoverview 2.0 (in Python 3.x) is available! 

github.com/alexandreborge…

There're so many news, so it's better to check on the GitHub ;)

#malware #threatintelligence #threathunting #security

🔥Working hard on a public release of my Malware Dev CI/CD toolkit ☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators ☢️RedBackdoorer - PE shellcode injection via 6 techniques ☢️RedWatermarker - IOC injector for implants tracking Already available to my sponsors 😁✨

mariuszbit's tweet image. 🔥Working hard on a public release of my Malware Dev CI/CD toolkit

☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
☢️RedBackdoorer - PE shellcode injection via 6 techniques
☢️RedWatermarker - IOC injector for implants tracking

Already available to my sponsors 😁✨
mariuszbit's tweet image. 🔥Working hard on a public release of my Malware Dev CI/CD toolkit

☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
☢️RedBackdoorer - PE shellcode injection via 6 techniques
☢️RedWatermarker - IOC injector for implants tracking

Already available to my sponsors 😁✨
mariuszbit's tweet image. 🔥Working hard on a public release of my Malware Dev CI/CD toolkit

☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
☢️RedBackdoorer - PE shellcode injection via 6 techniques
☢️RedWatermarker - IOC injector for implants tracking

Already available to my sponsors 😁✨

Diving deep into Windows hypervisor. A great post by r0keb (@r0keb) on Hyper-V loader, partitions, startup and other details, combined with lots of rev-engineered C code. Worth reading! Source: r0keb.github.io/posts/Hyper-V-… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Diving deep into Windows hypervisor.

A great post by r0keb (@r0keb) on Hyper-V loader, partitions, startup and other details, combined with lots of rev-engineered C code. Worth reading!

Source: r0keb.github.io/posts/Hyper-V-…

#redteam #maldev #malwaredevelopment

Malware Analysis tools and resources github.com/wtsxDev/Malwar… #Malware

xKaliSec's tweet image. Malware Analysis tools and resources
github.com/wtsxDev/Malwar…
#Malware

🚨 COMING SOON 🚨 After years of real-world malware dissections, offensive operations, and late-night reverse engineering battles, I'm finally putting it all into one place. 📘 MAoS – Malware Analysis on Steroids This isn't another theoretical guide. It's raw, practical, and…

MalFuzzer's tweet image. 🚨 COMING SOON 🚨
After years of real-world malware dissections, offensive operations, and late-night reverse engineering battles, I'm finally putting it all into one place.

📘 MAoS – Malware Analysis on Steroids
This isn't another theoretical guide. It's raw, practical, and…

Since I try to open-source my tools whenever possible: The last few days I've been revising my Malware Analysis VM setup script, which is now public. github.com/f0wl/MalwareLa…

f0wlsec's tweet image. Since I try to open-source my tools whenever possible: The last few days I've been revising my Malware Analysis VM setup script, which is now public. github.com/f0wl/MalwareLa…
f0wlsec's tweet image. Since I try to open-source my tools whenever possible: The last few days I've been revising my Malware Analysis VM setup script, which is now public. github.com/f0wl/MalwareLa…

So, do you wanna write malware ? Read this: bible.malcore.io/readme/the-beg… An Wonderful blog written by @Malcoreio

5mukx's tweet image. So, do you wanna write malware ? Read this:
bible.malcore.io/readme/the-beg…

An Wonderful blog written by @Malcoreio

Malwoverview is able to collect information about a malware from VirusTotal, Hybrid Analysis, URLHaus, Malpedia, Polyswarm, Malshare, Alien Vault, Valhalla and ThreadCrowd. Additionally, it checks packages from Android mobiles. github.com/alexandreborge… #ThreatHunting #Malware

ale_sp_brazil's tweet image. Malwoverview is able to collect information about a malware from VirusTotal, Hybrid Analysis, URLHaus, Malpedia, Polyswarm, Malshare, Alien Vault, Valhalla and ThreadCrowd. Additionally, it checks packages from Android mobiles.

github.com/alexandreborge…

#ThreatHunting  #Malware
ale_sp_brazil's tweet image. Malwoverview is able to collect information about a malware from VirusTotal, Hybrid Analysis, URLHaus, Malpedia, Polyswarm, Malshare, Alien Vault, Valhalla and ThreadCrowd. Additionally, it checks packages from Android mobiles.

github.com/alexandreborge…

#ThreatHunting  #Malware
ale_sp_brazil's tweet image. Malwoverview is able to collect information about a malware from VirusTotal, Hybrid Analysis, URLHaus, Malpedia, Polyswarm, Malshare, Alien Vault, Valhalla and ThreadCrowd. Additionally, it checks packages from Android mobiles.

github.com/alexandreborge…

#ThreatHunting  #Malware
ale_sp_brazil's tweet image. Malwoverview is able to collect information about a malware from VirusTotal, Hybrid Analysis, URLHaus, Malpedia, Polyswarm, Malshare, Alien Vault, Valhalla and ThreadCrowd. Additionally, it checks packages from Android mobiles.

github.com/alexandreborge…

#ThreatHunting  #Malware

Yes... This is Friday... 😎 Enjoy the ride, Theodore! #redteam #maldev #malwaredevelopment

Just won a free course from @SEKTOR7net ! 🙌 Big thanks to the team for the opportunity, can’t wait to dive in and level up my maldev knowledge, check out their website for more courses on malware development and there newsletter sign up #sektor7 institute.sektor7.net/consumer

institute.sektor7.net

Cybersecurity Courses For Individuals

malware development, malware development course, offensive code development, offensive coding, offcoding, red team operator, red teaming, blue team



Morphing shellcode during execution. Once a part of code is done executing, overwrite the block with new code to run. A proof of concept by Debjeet Banerjee (@whokilleddb) Src: github.com/whokilleddb/lo… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Morphing shellcode during execution.

Once a part of code is done executing, overwrite the block with new code to run.

A proof of concept by Debjeet Banerjee (@whokilleddb)

Src: github.com/whokilleddb/lo…

#redteam #maldev #malwaredevelopment
SEKTOR7net's tweet image. Morphing shellcode during execution.

Once a part of code is done executing, overwrite the block with new code to run.

A proof of concept by Debjeet Banerjee (@whokilleddb)

Src: github.com/whokilleddb/lo…

#redteam #maldev #malwaredevelopment

Block EDR dynamic libraries from loading. By using debugging API, exception handling and simple hooks, one can spawn a clean process (PoC blocks amsi.dll). A nice post by @dis0rder_0x00 Source: github.com/dis0rder0x00/o… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Block EDR dynamic libraries from loading.

By using debugging API, exception handling and simple hooks, one can spawn a clean process (PoC blocks amsi.dll).

A nice post by @dis0rder_0x00 

Source: github.com/dis0rder0x00/o…

#redteam #maldev #malwaredevelopment
SEKTOR7net's tweet image. Block EDR dynamic libraries from loading.

By using debugging API, exception handling and simple hooks, one can spawn a clean process (PoC blocks amsi.dll).

A nice post by @dis0rder_0x00 

Source: github.com/dis0rder0x00/o…

#redteam #maldev #malwaredevelopment

Diving deep into Windows hypervisor. A great post by r0keb (@r0keb) on Hyper-V loader, partitions, startup and other details, combined with lots of rev-engineered C code. Worth reading! Source: r0keb.github.io/posts/Hyper-V-… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Diving deep into Windows hypervisor.

A great post by r0keb (@r0keb) on Hyper-V loader, partitions, startup and other details, combined with lots of rev-engineered C code. Worth reading!

Source: r0keb.github.io/posts/Hyper-V-…

#redteam #maldev #malwaredevelopment

Overwriting files with Clipup as PPL. Clipup.exe launched as Protected Process Light can corrupt Windows Defender binary (during system startup). An interesting post by @TwoSevenOneT. Source: zerosalarium.com/2025/08/counte… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Overwriting files with Clipup as PPL.

Clipup.exe launched as Protected Process Light can corrupt Windows Defender binary (during system startup).

An interesting post by @TwoSevenOneT.

Source: zerosalarium.com/2025/08/counte…

#redteam #maldev #malwaredevelopment

DLL Injection with Timer-based Shellcode Execution. A classic DLL injection with CreateThreadpoolTimer to run shellcode in-memory using legit system threads. A post by Andrea Bocchetti. Source: github.com/andreisss/Remo… #redteam #maldev #malwaredevelopment


Skipping Winsock - AFD.sys for-the-win! A series of posts by Mateusz Lewczak (@MateuszLewczak) on how to use afd.sys driver to implement custom network connectivity. Highly recommended! Source: leftarcode.com/posts/afd-reve… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Skipping Winsock - AFD.sys for-the-win!

A series of posts by Mateusz Lewczak (@MateuszLewczak) on how to use afd.sys driver to implement custom network connectivity.

Highly recommended!

Source: leftarcode.com/posts/afd-reve…

#redteam #maldev #malwaredevelopment

Implementing a custom bootkit for Windows Sandbox exploration. An excellent post by Dylan Goods (@sdoogm) and Duncan Ogilvie (@mrexodia). Source: secret.club/2022/08/29/boo… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Implementing a custom bootkit for Windows Sandbox exploration.

An excellent post by Dylan Goods (@sdoogm) and Duncan Ogilvie (@mrexodia).

Source: secret.club/2022/08/29/boo…

#redteam #maldev #malwaredevelopment

To be a top tier malware developer you need study viruses in nature. Microbiology teaches strategies far beyond implants and AV evasion. This will set you a part from a person that only develops implants and loaders. #MalwareDevelopment

Lord_Guccifer's tweet image. To be a top tier malware developer you need study viruses in nature. Microbiology teaches strategies far beyond implants and AV evasion. This will set you a part from a person that only develops implants and loaders. 

#MalwareDevelopment

Just published a article on my blog - Malware Development: 🧠 Process Injection - DLL, Shellcode 🔗 Read here: debug-diary.vercel.app/post/Process_I… Also added hand drawn images for better understanding #MalwareDevelopment #WindowsInternals #Cybersecurity

dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity
dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity

Interesting bug in CimFS driver. More importantly, it still lives in the kernel, as "admin to kernel is not a security boundary"... A post by Chen Le Qi (@cplearns2h4ck). Great work! #redteam #maldev #malwaredevelopment starlabs.sg/blog/2025/03-c…

SEKTOR7net's tweet image. Interesting bug in CimFS driver. More importantly, it still lives in the kernel, as "admin to kernel is not a security boundary"...

A post by Chen Le Qi (@cplearns2h4ck). Great work!

#redteam #maldev #malwaredevelopment

starlabs.sg/blog/2025/03-c…
SEKTOR7net's tweet image. Interesting bug in CimFS driver. More importantly, it still lives in the kernel, as "admin to kernel is not a security boundary"...

A post by Chen Le Qi (@cplearns2h4ck). Great work!

#redteam #maldev #malwaredevelopment

starlabs.sg/blog/2025/03-c…

ไม่พบผลลัพธ์สำหรับ "#malwaredevelopment"

Morphing shellcode during execution. Once a part of code is done executing, overwrite the block with new code to run. A proof of concept by Debjeet Banerjee (@whokilleddb) Src: github.com/whokilleddb/lo… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Morphing shellcode during execution.

Once a part of code is done executing, overwrite the block with new code to run.

A proof of concept by Debjeet Banerjee (@whokilleddb)

Src: github.com/whokilleddb/lo…

#redteam #maldev #malwaredevelopment
SEKTOR7net's tweet image. Morphing shellcode during execution.

Once a part of code is done executing, overwrite the block with new code to run.

A proof of concept by Debjeet Banerjee (@whokilleddb)

Src: github.com/whokilleddb/lo…

#redteam #maldev #malwaredevelopment

Implementing a custom bootkit for Windows Sandbox exploration. An excellent post by Dylan Goods (@sdoogm) and Duncan Ogilvie (@mrexodia). Source: secret.club/2022/08/29/boo… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Implementing a custom bootkit for Windows Sandbox exploration.

An excellent post by Dylan Goods (@sdoogm) and Duncan Ogilvie (@mrexodia).

Source: secret.club/2022/08/29/boo…

#redteam #maldev #malwaredevelopment

Diving deep into Windows hypervisor. A great post by r0keb (@r0keb) on Hyper-V loader, partitions, startup and other details, combined with lots of rev-engineered C code. Worth reading! Source: r0keb.github.io/posts/Hyper-V-… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Diving deep into Windows hypervisor.

A great post by r0keb (@r0keb) on Hyper-V loader, partitions, startup and other details, combined with lots of rev-engineered C code. Worth reading!

Source: r0keb.github.io/posts/Hyper-V-…

#redteam #maldev #malwaredevelopment

Skipping Winsock - AFD.sys for-the-win! A series of posts by Mateusz Lewczak (@MateuszLewczak) on how to use afd.sys driver to implement custom network connectivity. Highly recommended! Source: leftarcode.com/posts/afd-reve… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Skipping Winsock - AFD.sys for-the-win!

A series of posts by Mateusz Lewczak (@MateuszLewczak) on how to use afd.sys driver to implement custom network connectivity.

Highly recommended!

Source: leftarcode.com/posts/afd-reve…

#redteam #maldev #malwaredevelopment

Overwriting files with Clipup as PPL. Clipup.exe launched as Protected Process Light can corrupt Windows Defender binary (during system startup). An interesting post by @TwoSevenOneT. Source: zerosalarium.com/2025/08/counte… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Overwriting files with Clipup as PPL.

Clipup.exe launched as Protected Process Light can corrupt Windows Defender binary (during system startup).

An interesting post by @TwoSevenOneT.

Source: zerosalarium.com/2025/08/counte…

#redteam #maldev #malwaredevelopment

Interesting bug in CimFS driver. More importantly, it still lives in the kernel, as "admin to kernel is not a security boundary"... A post by Chen Le Qi (@cplearns2h4ck). Great work! #redteam #maldev #malwaredevelopment starlabs.sg/blog/2025/03-c…

SEKTOR7net's tweet image. Interesting bug in CimFS driver. More importantly, it still lives in the kernel, as "admin to kernel is not a security boundary"...

A post by Chen Le Qi (@cplearns2h4ck). Great work!

#redteam #maldev #malwaredevelopment

starlabs.sg/blog/2025/03-c…
SEKTOR7net's tweet image. Interesting bug in CimFS driver. More importantly, it still lives in the kernel, as "admin to kernel is not a security boundary"...

A post by Chen Le Qi (@cplearns2h4ck). Great work!

#redteam #maldev #malwaredevelopment

starlabs.sg/blog/2025/03-c…

Putting out an absolute banger of a 20 minute video on #Rust #malwaredevelopment tomorrow and this sums up a lot of my frustrations.

valhalla_dev's tweet image. Putting out an absolute banger of a 20 minute video on #Rust #malwaredevelopment tomorrow and this sums up a lot of my frustrations.

This week is tough, since I completed all my placement coding rounds. Now its time to get back into nerdy works! #malware #malwaredevelopment #nerds #cybersecurity #hacking #pentesting #redteam #nerds #nerdy

5mukx's tweet image. This week is tough, since I completed all my placement coding rounds. Now its time to get back into nerdy works!

 #malware #malwaredevelopment #nerds #cybersecurity #hacking #pentesting #redteam #nerds #nerdy

VX-API - Collection Of Various Malicious Functionality To Aid In Malware Development #MalwareDevelopment #MalwareResearch #VXAPI dlvr.it/Stj3Hl

blueteamsec1's tweet image. VX-API - Collection Of Various Malicious Functionality To Aid In Malware Development #MalwareDevelopment #MalwareResearch #VXAPI  dlvr.it/Stj3Hl

Block EDR dynamic libraries from loading. By using debugging API, exception handling and simple hooks, one can spawn a clean process (PoC blocks amsi.dll). A nice post by @dis0rder_0x00 Source: github.com/dis0rder0x00/o… #redteam #maldev #malwaredevelopment

SEKTOR7net's tweet image. Block EDR dynamic libraries from loading.

By using debugging API, exception handling and simple hooks, one can spawn a clean process (PoC blocks amsi.dll).

A nice post by @dis0rder_0x00 

Source: github.com/dis0rder0x00/o…

#redteam #maldev #malwaredevelopment
SEKTOR7net's tweet image. Block EDR dynamic libraries from loading.

By using debugging API, exception handling and simple hooks, one can spawn a clean process (PoC blocks amsi.dll).

A nice post by @dis0rder_0x00 

Source: github.com/dis0rder0x00/o…

#redteam #maldev #malwaredevelopment

🤖 NEW COURSE! OFFENSIVE AI - ATTACK TOOLS & TECHNIQUES 🤖 #AI Driven - 🔎 Recon ✉️ #SocialEngineering 🎭 Deep Fake Dev 💻 Exploitation ☠️ #MalwareDevelopment Open for registration *special BETA pricing, this run only* - sans.org/sec535 #OffensiveAI #SEC535

SANSOffensive's tweet image. 🤖  NEW COURSE! OFFENSIVE AI - ATTACK TOOLS & TECHNIQUES 🤖 

#AI Driven - 
🔎 Recon
✉️ #SocialEngineering
🎭 Deep Fake Dev
💻 Exploitation
☠️ #MalwareDevelopment

Open for registration *special BETA pricing, this run only* - sans.org/sec535 #OffensiveAI #SEC535

The convergence of older tools like Mantis with LLMs is transforming malware tactics, enabling advanced phishing and self-guided attacks. The threat landscape continues to evolve. 🚨🔍 #MalwareDevelopment #PhishingThreats #USA link: ift.tt/ZdkqlEo

TweetThreatNews's tweet image. The convergence of older tools like Mantis with LLMs is transforming malware tactics, enabling advanced phishing and self-guided attacks. The threat landscape continues to evolve. 🚨🔍 #MalwareDevelopment #PhishingThreats #USA

link: ift.tt/ZdkqlEo

Module Release 🤗 EDR & Antivirus Evasion Part II The perfect post to explore comprehensive methods, techniques, and extensions for EDR and Antivirus Evasion in Windows OS. 25/01/2025 – 54min. read – 57 PDF Pages 0x12darkdev.net/modules #Malware #MalwareDevelopment #Pentest

Salsa12__'s tweet image. Module Release 🤗

EDR & Antivirus Evasion Part II

The perfect post to explore comprehensive methods, techniques, and extensions for EDR and Antivirus Evasion in Windows OS.

25/01/2025 – 54min. read – 57 PDF Pages

0x12darkdev.net/modules

#Malware #MalwareDevelopment #Pentest

To be a top tier malware developer you need study viruses in nature. Microbiology teaches strategies far beyond implants and AV evasion. This will set you a part from a person that only develops implants and loaders. #MalwareDevelopment

Lord_Guccifer's tweet image. To be a top tier malware developer you need study viruses in nature. Microbiology teaches strategies far beyond implants and AV evasion. This will set you a part from a person that only develops implants and loaders. 

#MalwareDevelopment

Malware Books 📚Rootkits: Subverting The Windows Kernel by Greg Hoglund & James Butler #malware #malwaredevelopment #hacking #infosec

VX_Zmist's tweet image. Malware Books 📚Rootkits: Subverting The Windows Kernel by Greg Hoglund & James Butler 

#malware #malwaredevelopment #hacking #infosec

Just published a article on my blog - Malware Development: 🧠 Process Injection - DLL, Shellcode 🔗 Read here: debug-diary.vercel.app/post/Process_I… Also added hand drawn images for better understanding #MalwareDevelopment #WindowsInternals #Cybersecurity

dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity
dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity

Malware Books 📚: The Art Of Computer Virus Research And Defence By Peter Szor #malware #malwaredevelopment #hacking

VX_Zmist's tweet image. Malware Books 📚:  The Art Of Computer Virus Research And Defence By Peter Szor 

#malware #malwaredevelopment #hacking

Malware Books 📚 : The Giant black book of computer viruses By Mark Ludwig #malware #malwaredevelopment #hacking

VX_Zmist's tweet image. Malware Books 📚 : The Giant black book of computer viruses By Mark Ludwig

#malware #malwaredevelopment #hacking

Loading...

Something went wrong.


Something went wrong.


United States Trends