malware source code
Ctrlk
  • Introduction
  • Code base
    • Headers
    • CRT Recreation
  • String Hashing
  • Antidebugging Methods
  • Library Loading
  • Error Handling
  • Fingerprinting
  • Wrappers and Helpers
  • Process Creation Techniques
  • Shellcode Execution
  • Compression
  • Networking
  • Lsass Related
  • Proxied Functions
  • Evasion
  • Component Object Model
  • My Projects
    • Proof-of-Concepts
    • Write-ups
      • A Quick Guide to Defining Malware with $0, Python3, and Windows
      • Why do video games use kernel-mode anti-cheats?
      • Fake Lockbit 5.0 silliness and 3 layers of ransomware lasagna
      • Wtf are these Threat Actors doing? XUbuntu malware is dumb and stinky
      • The rise of malware mainstream "acceptance" and "popularity" is thanks to the government
      • Can "adult" websites actually "infect" your computer?
Powered by GitBook
On this page
  1. My Projects

Write-ups

A Quick Guide to Defining Malware with $0, Python3, and WindowsWhy do video games use kernel-mode anti-cheats?Fake Lockbit 5.0 silliness and 3 layers of ransomware lasagnaWtf are these Threat Actors doing? XUbuntu malware is dumb and stinkyThe rise of malware mainstream "acceptance" and "popularity" is thanks to the governmentCan "adult" websites actually "infect" your computer?
PreviousDisabling Bitlocker Encryption using undocumented COM objectsNextA Quick Guide to Defining Malware with $0, Python3, and Windows