ByteShield
1.29K subscribers
99 photos
32 videos
107 files
519 links
Download Telegram
Malware Development Series:



Malware development: persistence - part 1. Registry run keys. C++ example.

Malware development: persistence - part 2. Screensaver hijack. C++ example.

Malware development: persistence - part 3. COM DLL hijack.

Malware development: persistence - part 4. Windows services. Simple C++ example.

Malware development: persistence - part 5. AppInit_DLLs. Simple C++ example.

Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example.

Malware AV evasion: part 7. Disable Windows Defender. Simple C++ example.

Malware AV evasion - part 8. Encode payload via Z85 algorithm. C++ example.

Malware AV evasion - part 9. Encrypt base64 encoded payload via RC4. C++ example.

Malware AV/VM evasion - part 10: anti-debugging. NtGlobalFlag. Simple C++ example.

Malware AV/VM evasion - part 11: encrypt payload via DES. Simple C++ example.

Malware AV/VM evasion - part 12: encrypt/decrypt payload via TEA. Simple C++ example.

Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example.

Malware AV/VM evasion - part 14: encrypt/decrypt payload via A5/1. Bypass Kaspersky AV. Simple C++ example.

Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.

Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.

Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.

Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.

Malware development: persistence - part 22. Windows Setup. Simple C++ example.

Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.

Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.

Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.

Malware development: persistence - part 23. LNK files. Simple Powershell example.

Malware development: persistence - part 24. StartupApproved. Simple C example.

Malware and cryptography 22: encrypt/decrypt payload via XTEA. Simple C++ example.

Malware and cryptography 23: encrypt/decrypt file via TEA. Simple C/C++ example.

Malware and cryptography 24: encrypt/decrypt file via Madryga. Simple C/C++ example.

Malware and cryptography 25: encrypt/decrypt payload via RC6. Simple C/C++ example.

Malware AV/VM evasion - part 15: WinAPI GetModuleHandle implementation. Simple C++ example.

Malware AV/VM evasion - part 16: WinAPI GetProcAddress implementation. Simple C++ example.

Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.

Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.

Malware development: persistence - part 22. Windows Setup. Simple C++ example.

Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.

Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.

Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.

#malware
#cpp
🔥2
pwn.college is an education platform for students (and other interested parties) to learn about, and practice, core cybersecurity concepts in a hands-on fashion. In martial arts terms, it is designed to take a “white belt” in cybersecurity through the journey to becoming a “blue belt”, able to approach (simple) cybersecurity competitions (CTFs) and wargames. Our philosophy is “practice makes perfect”.

pwn.college
🔥1
Forwarded from Proxy Bar
cve-2024-6387-poc.zip
21.1 KB
CVE-2024-6387: Критическая уязвимость OpenSSH без аутентификации RCE «regreSSHion»
*
Почитать
*
1- Go to /wp-login.php?action=register
2- Register with the name admin if it is available
3- Go to the email
4- Then you will see that the registration has been completed. Log in to the admin panel. and congratulations, you have obtained admin permission

#wordpress
A Christian pilgrim in the shrine of Imam Hussain (AS)said: Imam Hussain (AS)belongs to all humanity and the pilgrimage to Karbala is not for a specific group and from Africa to India. And the pilgrim of Imam Hussain (AS)) are followers of different religions, including Christians and Muslims,

#Hussain
#حب_الحسین_یجمعنا
❤‍🔥5👎31