Working with Shellcode from Malware

Working with Shellcode from Malware

#HITB2024BKK #COMMSEC D1: My First and Last Shellcode LoaderПодробнее

#HITB2024BKK #COMMSEC D1: My First and Last Shellcode Loader

Malware 101: Hiding Shellcode in the Resource Section of PE File.Подробнее

Malware 101: Hiding Shellcode in the Resource Section of PE File.

Post DEFCON | Shellcode Injection | MalwareПодробнее

Post DEFCON | Shellcode Injection | Malware

Malware 101: Injection Basics - Remote Shellcode InjectionПодробнее

Malware 101: Injection Basics - Remote Shellcode Injection

Malware 101: Injection Basics - Local Shellcode InjectionПодробнее

Malware 101: Injection Basics - Local Shellcode Injection

FindWindowA Shellcode Injection POC | Malware DevelopmentПодробнее

FindWindowA Shellcode Injection POC | Malware Development

Process Injection Techniques: Deep Dive into Process Hollowing & ShellcodeПодробнее

Process Injection Techniques: Deep Dive into Process Hollowing & Shellcode

Malware development 101: Creating your first ever MALWAREПодробнее

Malware development 101: Creating your first ever MALWARE

Malware Development Course: Process Injection Part 2 (Shellcode)Подробнее

Malware Development Course: Process Injection Part 2 (Shellcode)

WinAPI is EASY | Embedding Shellcode in .text, .data, and .rsrcПодробнее

WinAPI is EASY | Embedding Shellcode in .text, .data, and .rsrc

Threat Actors Using a Shellcode based Packer To Inject Malware with Dr.David Utzke | myCPE shortsПодробнее

Threat Actors Using a Shellcode based Packer To Inject Malware with Dr.David Utzke | myCPE shorts

Developing Trojans With ShellcodeПодробнее

Developing Trojans With Shellcode

Fun with Shellcode (Loaders)Подробнее

Fun with Shellcode (Loaders)

THM AV Evasion Shellcode Task 5-7Подробнее

THM AV Evasion Shellcode Task 5-7

Windows Red Team - Dynamic Shellcode Injection & PowerShell ObfuscationПодробнее

Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation

DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieveПодробнее

DEF CON 30 - Kyle Avery - Avoiding Memory Scanners - Customizing Malware to Evade YARA, PE-sieve

Malware Analysis of XOR Encrypted ShellcodeПодробнее

Malware Analysis of XOR Encrypted Shellcode

The Hackle Box May 2022: F5-Big IP, Fileless Malware Hides Shellcode in Windows Event Logs, and MoreПодробнее

The Hackle Box May 2022: F5-Big IP, Fileless Malware Hides Shellcode in Windows Event Logs, and More

Malware Development in C | Executing Shellcode using WinAPIПодробнее

Malware Development in C | Executing Shellcode using WinAPI

События