#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-1
Cyberark
Fantastic Rootkits: And Where to Find Them (Part 1)
Introduction In this blog series, we will cover the topic of rootkits β how they are built and the basics of kernel driver analysis β specifically on the Windows platform. In this first part, we...
#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-2
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-2
Cyberark
Fantastic Rootkits and Where to Find Them (Part 2)
Know Your Enemy In the previous post (Part 1), we covered several rootkit technique implementations. Now we will focus on kernel rootkit analysis, looking at two case studies of rootkits found in...
#rootkits
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-3-arm-edition
https://www.cyberark.com/resources/threat-research-blog/fantastic-rootkits-and-where-to-find-them-part-3-arm-edition
Cyberark
Fantastic Rootkits: And Where To Find Them (Part 3) β ARM Edition
Introduction In this blog, we will discuss innovative rootkit techniques on a non-traditional architecture, Windows 11 on ARM64. In the prior posts, we covered rootkit techniques applied to a...
π1
kurogai/100-redteam-projects: Projects for security students
https://github.com/kurogai/100-redteam-projects
https://github.com/kurogai/100-redteam-projects
GitHub
GitHub - kurogai/100-redteam-projects: Projects for security students
Projects for security students. Contribute to kurogai/100-redteam-projects development by creating an account on GitHub.
π2π1
Black hat usa 2024 slides
https://drive.google.com/drive/u/0/mobile/folders/1nCCA7VB3Ez-F2BfiAIFWr2z_frxGRWhd
https://drive.google.com/drive/u/0/mobile/folders/1nCCA7VB3Ez-F2BfiAIFWr2z_frxGRWhd
π₯6
Malware Development
#malware
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR
#malware
Part I - Analysis and DFIR Series
Part II - Analysis and DFIR Series
Part III - Analysis and DFIR Series
Part IV - Analysis and DFIR
azr43lkn1ght.github.io
Malware Development, Analysis and DFIR Series - Part I
1st post of Malware Development, Analysis and DFIR Series. This post will be focussed on developing Malwares for ethical purposes only, The author is not liable for any damages caused.
π5