Malware Development

Work in Progress

Table Of Contents

Courses

SEKTOR7 Institute

https://maldevacademy.com/

EvasionEDR By Matt Hand

Sources

URLDescriptionCategory
https://github.com/NUL0x4C/HellShellHellShell GitHub repositoryPenetration Testing
https://www.corelan.be/index.php/2010/06/16/exploit-writing-tutorial-part-10-chaining-dep-with-rop-the-rubikstm-cube/#weaponExploit writing tutorial on Corelan.beExploit Development
https://www.corelan.be/Corelan.be websiteCybersecurity
https://github.com/Krypteria/AtlasLdrAtlasLdr GitHub repositoryMalware Analysis
https://labs.jumpsec.com/obfuscating-c2-during-a-red-team-engagement/Article on obfuscating C2 during Red Team engagementRed Teaming
https://github.com/matterpreter/DefenderCheckDefenderCheck GitHub repositorySecurity Tools
https://pinvoke.net/PInvoke.net – Platform Invoke for .NETProgramming
https://github.com/mkaring/ConfuserEx/releases/tag/v1.6.0ConfuserEx GitHub repository (v1.6.0 release)Malware Analysis
https://virusscan.jotti.org/en-US/scan-fileJotti’s Virus Scan – File scanning toolAntivirus
https://redops.at/en/blog/direct-syscalls-a-journey-from-high-to-lowArticle on direct syscalls in Red TeamingRed Teaming
https://research.checkpoint.com/2023/raspberry-robin-anti-evasion-how-to-exploit-analysis/Raspberry Robin anti-evasion exploit analysisExploit Analysis
https://vanmieghem.io/process-injection-evading-edr-in-2023/Article on process injection and EDR evasionCybersecurity
https://redsiege.com/blog/2023/04/evading-crowdstrike-falcon-using-entropy/Evading Crowdstrike Falcon using entropyEvasion Techniques
https://evasions.checkpoint.com/Check Point Evasions – Evasion techniquesEvasion Techniques
https://vx-underground.org/VX Underground – Malware and Exploit CommunityMalware Analysis
Home – Unprotect ProjectSearch Evasion TechniquesEvasion Techniques

Similar Posts