
Malware on Steroids Part 3: Machine Learning & Sandbox Evasion
Hey, It’s been a busy month for me and I was not able to save time to write the final […]
Hey, It’s been a busy month for me and I was not able to save time to write the final […]
Recap In the previous post, we wrote a simple CMD Reverse Shell over TCP. However, in a real-life scenario, things […]
The Prologue This is my reposting of the blog series I wrote here at ScriptDotSh If you haven’t watched the […]
The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however […]
Prologue In the previous blog here, we reverse engineered a simple binary containing plaintext password in Linux with the help […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the […]
Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a […]
In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and […]
In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about […]