Malware Dev – Chapter 07 – Anti-Disassembly Strategies
Continued series from the Malware Development for Ethical Hackers Book.GitHub repo: EricTurner3 – Malware_Development. Opcode / Assembly Obfuscation The main...
Malware Dev – Chapter 06 – Anti-VM Strategies
Continued series from the Malware Development for Ethical Hackers Book.GitHub repo: EricTurner3 – Malware_Development. Filesystem Detection Techniques VirtualBox Machine Detection...
Malware Dev – Chapter 05 – Anti-Debugging Tricks
Continued series from the Malware Development for Ethical Hackers Book.GitHub repo: EricTurner3 – Malware_Development. Detecting Debugger IsDebuggerPresent() Sample code using...
Malware Dev – Chapter 04 – Privilege Escalation
Continued series from the Malware Development for Ethical Hackers Book.GitHub repo: EricTurner3 – Malware_Development. This chapter contains methods to achieve...
Malware Dev – Chapter 03 – Persistence
Continued series from the Malware Development for Ethical Hackers Book.GitHub repo: EricTurner3 – Malware_Development. This chapter contains methods to...
Malware Dev – Chapter 02 – Injection
Continued series from the Malware Development for Ethical Hackers Book. The first part of this chapter deals with...
Malware Dev – Chapter 01
I recently picked several new books from Packt, including Malware Development for Ethical Hackers. This book aims to...
Malware Analysis – Mirai Wicked Sample – 9Jan2025
Analysis of a sample from Malware bazaar: MalwareBazaar | SHA256 a01d53662d83c31a5b4478bc57fc4fee1ba9d4f6178a94a107c472133adea368 (Mirai) Stage 1 The initial download is...

HackTheBox – Sherlock – Lovely Malware
Challenge: https://app.hackthebox.com/sherlocks/Lovely%20Malware An employee at NeirCyber Security discovered a suspicious file named employee_benefits.exe on their desktop. The employee...
HackTheBox Sherlock: Subatomic
Challenge: https://app.hackthebox.com/sherlocks/Subatomic Introduction Forela is in need of your assistance. They were informed by an employee that their...