Advertisement · 728 × 90
#
Hashtag
#maldev
Advertisement · 728 × 90
APT31 Today: When Trusted Cloud Infrastructure Becomes the Attack Surface How APT31 turned Microsoft Dev Tunnels, cloud storage, and signed binaries into stealthy command and control.

APT31 isn’t breaking in. They’re blending in.

Microsoft Dev Tunnels, cloud storage, signed binaries, all abused as stealthy C2.
This is trust exploitation at scale.

🔗 blackcastle.com.au/blog/apt31-t...

#APT #ThreatIntelligence #CloudSecurity #DetectionEngineering #CyberSecurity #Maldev #offsec

1 0 0 0
Preview
Malware Analysis Masterclass - Dissecting Viruses, Trojans & Malicious Code - What is Malware 🔒 Malware Analysis Masterclass - Dissecting Viruses, Trojans & Malicious Code - What is Malware 🚨 LIMITED OFFER – Get 1 MONTH of FREE PREMIUM ACCESS to our best cybersecurity courses! 🎓 Only for the ...

Malware Analysis Masterclass - Dissecting Viruses, Trojans & Malicious Code - What is Malware
twuai.com/search/VcOoV...

#AllGoodTutorials #MalwareAnalysis #CyberSecurity #ReverseEngineering #EthicalHacking #CyberSecCareer #ITTraining #AllGoodTutorials #CyberSecurityForBeginners #Maldev #Sysadmin

0 0 0 0
Preview
SK Telecom BPFDoor Malware: Malware Scanner and Detection || Malware Detector *SK Telecom BPFDoor Malware: Malware Scanner and Detection* It's official that the SK Telecom incident or breach was caused by malware named BPFDoor. It exploits the Berkeley Packet Filter that works...

SK Telecom BPFDoor Malware: Malware Scanner and Detection || Malware Detector
twuai.com/search/MNene...
#maldev #redteam #pentesting #privesc #malware #BPF #Backdoor #SKTelecom #Scanner

0 0 0 0
Preview
Android Hacking for Beginners | Ethical Hacking Full Course (Step-by-Step) | mobile hacking course Learn Android Ethical Hacking from Scratch! This course is designed for beginners who want to understand android hacking Watch at 1.5x speed 🔹 [00:00] - Introduction to Android Ethical Hacking 🔹 [01...

Android Hacking for Beginners | Ethical Hacking Full Course (Step-by-Step) | mobile hacking course twuai.com/search/8z7wG...
#msfvenom #metasploit #maldev #exploiting #android #malware #hacking101 #shellcode #binwalk

1 0 0 0
Preview
The Ouroboros Of Cybercrime: Threat Actors Go From Pwn To Pwnd - Estelle Ruellan & Stuart Beck - Buscar con Twuai La informacion relevante sobre The Ouroboros Of Cybercrime: Threat Actors Go From Pwn To Pwnd - Estelle Ruellan & Stuart Beck y mucho mas la encuentras en twuai.com

The Ouroboros Of Cybercrime: Threat Actors Go From Pwn To Pwnd - Estelle Ruellan & Stuart Beck twuai.com/search/bpfEJ...
#cybercrime #ecrime #malware #steeler #maldev #cybersecurity #hacking #DFIR #infosec

0 0 0 0
Preview
Getting Started With Ghidra For Malware Analysis - Buscar con Twuai La informacion relevante sobre Getting Started With Ghidra For Malware Analysis y mucho mas la encuentras en twuai.com

Getting Started With Ghidra For Malware Analysis twuai.com/search/dW8YF...
#RE #Malware #analysis #maldev #asm #lowlevel #ghidra #debugger #nsa #cybersecurity #hacking

0 0 0 0
Preview
SOC Lvl. 2 | EP.41 | Dissecting PE Headers | TryHackMe Malware Analysis Serious About Learning CySec? Consider joining Hackaholics Anonymous. By joining the Hackaholics Anonymous community, you'll get direct access to me, a community of supportive likeminded individuals,...

SOC Lvl. 2 | EP.41 | Dissecting PE Headers | TryHackMe Malware Analysis 2twu.com/post/7510085...
#cybersecurity #maldev #RE #DFIR

0 0 0 0
MalDev Myths

#MalDev Myths by @dobin

https://blog.deeb.ch/posts/maldev-myths/

0 0 0 0

Want to execute shellcode without API calls?

Abuse indirect syscalls via HAL dispatch tables.

Hook NtAllocateVirtualMemory and redirect execution stealthily. EDR visibility?

Nearly zero.

#MalDev #RedTeam #Infosec #cybersecurity #powershell

0 0 0 0
Writing Migratory Payloads Hi. I’m procrastinating again, but this time it’s related to the project I’m procrastinating. And according to a well respected hacker, this is a functional way to be productive. So you, the reader, b...

Merry Christmas, have another Windows maldev blog: writing migratory payloads. Learn the secret to disappearing from your mouse and reappearing inside explorer.exe! amethyst.systems/blog/posts/w... #infosec #malware #maldev

17 8 0 0
Malware Development Introduction aka Malware Dev 101 - Part 2 Malware Development Introduction (aka Malware Dev 101), Part 2 - Evasion Basics

Finally published Part 2 of my small "Malware Development Introduction" series (aka malware dev 101).

This post covers intro to process injection, practical malware evasion concepts in C++/C#, and various resources I use.

wsummerhill.github.io/redteam/2024...

#malwaredev #maldev #redteam

2 0 0 0

#maldev

hellripper.bandcamp.com/album/black-arts-alchemy...


Original->

0 0 0 0
Preview
Windows Rootkits (and Bootkits) Guide v2 The picture from the movie Elysium Hello folks and have a good day. If u follow my blog, u might know that my two previous blog posts discus...

Windows Rootkits (and Bootkits) Guide v2

artemonsecurity.blogspot.com/2024/07/wind...

#maldev #rootkit #bootkit #windows

2 0 0 0