Malware.development
Malware attacks/techniques explained
Install / Use
/learn @leetCipher/Malware.developmentREADME
Malware development
Malware attacks/techniques explained.
Attacks/Techniques explained (Windows)
- Self-injection
- Process injection
- Local DLL injection/Self-DLL injection
- Remote DLL injection/DLL injector
- Using executable resources to hide images with embedded shellcode
- DLL Proxing
- Default txt extension hijacking
- PE headers eradication
- Dynamically filling PE code with NOPs
Attacks/Techniques explained (Linux)
- Process self-injection
- Shellcode development (32-bit)
- Shellcode development (64-bit)
Series Playlist
- https://www.youtube.com/watch?v=zEk3mi4Pt_E&list=PLybHbyv-eKf5_gZ1EfFjkjCXTUksOR6TN&index=3
