Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-malware-development
Organized list of my malware development resources
https://github.com/rootkit-io/awesome-malware-development
Last synced: 4 days ago
JSON representation
-
Free books
- Introduction to Shellcode Development
- Mutants Sessions Self Deletion
- TL-TROJAN
- Linker_preloading_virus
- Awesome-linux-rootkits
- Virii
- Flare-floss
- Ebpfkit
- Al-Khaser
- Evasions
- loonix_syscall_hook
- SideCopy APT tooling
- Make your own first fud crypter
- Malware Development – Welcome to the Dark Side: Part 1
- Art of Malware
- Malware Development Part 1
- Basic Ransomware guide
- Understanding TRITON and the Missing Final Stage of the Attack good read.
- Master of RATs - How to create your own Tracker
- Amazing article to read with some good resources (Personal Tale and the Road to Malware Development, Resources)
- PT_NOTE -> PT_LOAD x64 ELF virus written in Assembly
- The magic of LD_PRELOAD for Userland Rootkits(good read if you wanna get into rootkits this blog is for userland rootkits)
- (Recommended Read) if you want to creat your first userland rootkit and you just know C you can go for this blog if you wanna start into rootkit development
- Function Hooking Part I: Hooking Shared Library Function Calls in Linux
- Inline Hooking for Programmers (Part 1: Introduction)
- Inline Hooking for Programmers (Part 2: Writing a Hooking Engine)
- PE injection for beginners
- Becoming-rat-your-system
- Complete guide on LKM hacking
- Best series i will say if you wanna get into programming/malware dev recommended series to follow it will start with learn programming thats needed asm and stuff after that getting into maldev
- Filess malware
- Examining the Morris Worm Source Code
- IOT Malware
- DoublePulsar SMB backdoor analysis
- Eset Turla Outlook backdoor report
- Writing a custom encoder
- Engineering antivirus evasion
- Analysis of Project Sauron APT
- WastedLocker analysis
- Detailed analysis of Zloader
- BendyBear shellcode malware
- A Basic Windows DKOM Rootkit
- Loading Kernel Shellcode
- Windows Kernel Shellcode on Windows 10 – Part 1
- Windows Kernel Shellcode on Windows 10 – Part 2
- Windows Kernel Shellcode on Windows 10 – Part 3
- Introduction to Shellcode Development
- Autochk Rootkit Analysis
- pierogi backdoor
- Pay2Kitten
- STEELCORGI
- Lebanese Cedar APT
- LazyScripter
- Maze deobfuscation
- Darkside overview
- Code obfuscation techniques
- SideCopy APT tooling
- Hiding in PEB sight: Custom loader
- Zloader: New infection technique
- A tale of EDR bypass methods
- In-depth dive into the security features of the Intel/Windows platform secure boot process
- Process Injection Techniques
- Adventures with KernelCallbackTable Injection
- Useful Libraries for Malware Development
- Parent Process ID (PPID) Spoofing
- OffensiVe Security with V - Process Hollowing
- Looking for Remote Code Execution bugs in the Linux kernel
- memory-analysis-evasion
- SideCopy APT tooling
- Loading Kernel Shellcode
- SideCopy APT tooling
- SideCopy APT tooling
- SideCopy APT tooling
- 100% evasion - Write a crypter in any language to bypass AV
- Underground
- MalShare
- SideCopy APT tooling
- SideCopy APT tooling
- Introduction to Shellcode Development
- SideCopy APT tooling
- SideCopy APT tooling
- Introduction to Shellcode Development
- SideCopy APT tooling
- SideCopy APT tooling
- Introduction to Shellcode Development
- Malware Bazaar
- SideCopy APT tooling
- Introduction to Shellcode Development
- Introduction to Shellcode Development
- SideCopy APT tooling
- Introduction to Shellcode Development
- SideCopy APT tooling
- Introduction to Shellcode Development
- loonix_syscall_hook
- SideCopy APT tooling
- SideCopy APT tooling
- Introduction to Shellcode Development
- SideCopy APT tooling
- FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines
- SideCopy APT tooling
- SideCopy APT tooling
- Introduction to Shellcode Development
- SideCopy APT tooling
- SideCopy APT tooling
- SunBurst backdoor - FireEye analysis
- SideCopy APT tooling
- Introduction to Shellcode Development
- SideCopy APT tooling
- Function Hooking Part I: Hooking Shared Library Function Calls in Linux
- SideCopy APT tooling
- Lazarus shellcode execution
- SideCopy APT tooling
- Introduction to Shellcode Development
- Introduction to Shellcode Development
- Introduction to Shellcode Development
-
Uncategorized
Programming Languages
Categories
Sub Categories
Keywords
malware
4
linux
3
rootkit
3
sandbox-evasion
2
anti-vm
2
anti-sandbox
2
anti-emulation
2
anti-analysis
2
malware-analysis
1
gsoc-2024
1
flare
1
deobfuscation
1
x86
1
windows
1
win32
1
virus
1
dos
1
assembly
1
rootkits
1
awesome-list
1
strings
1
ebpf
1
kernel
1
linux-kernel
1
linux-kernel-hacking
1
runtime-security
1
security
1
anti-debugging
1
anti-disassembly
1
av-bypass
1
code-injection
1
timing-attacks
1
evasions
1
vm-detect
1
arm64
1