Stevenstoni.hashnode.dev·Mar 24, 2024What is shellcode and how do we use it to pop shells?C:\Windows\System32 > whoami I'm a Senior Penetration Tester with a keen eye on safeguarding network and Active Directory environments. My qualifications, highlighted by certifications like eJPTv1, PNPT, ICCA, CARTP, CNPen, and CRTE, speak to my expe...Discussmalware development
Roger P.malwaresloth.com·Mar 19, 2024How Malware Generates Millions with Just 60 Lines of Code: A Rust Developer's Guide to Clipboard HijackingIntroduction Welcome back to Malware Sloth Developer Series, where we build the malware that infects thousands of users daily. This guide delves into a particularly simple tactic malware developers employ clipboard hijacking. Clipboard Hijacking Clip...Discuss·26 readsDevelopmentMalware
Roger P.malwaresloth.com·Mar 6, 2024Mastering the Art of UAC Bypass with fodhelper.exe: A Rust Developer's GuideIntroduction Welcome to the inaugural post of Malware Sloth! I'm thrilled to kick things off with some exciting (to me) material that I hope you'll find both informative and intriguing. What better way to launch than with an in-depth exploration of a...Discuss·1 like·114 readsDevelopmentMalwareSloth
Adrianajcyb3r.com·Feb 6, 2024Journey through Cybersecurity: Malware based on system components?I have no idea why, but sometimes acronyms in English are so interesting to me that they draw me deeper... In the previous post, I summarized my Windows Security review, mainly focusing on learning and reviewing PowerShell... and a few others. In the...Discuss#cybersecurity
Adarsh Pratap Singhshivangthakur579.hashnode.dev·Jan 18, 2024Important Question on Cyber Security and Its LawAn Information System is an interconnected set of components used to collect, store, process and transmit data and digital information. It is a collection of hardware, software, network, data, people and process that work together to transform raw da...Discuss·1 like·88 readsapplications security
Aljoscha Irmeraljoschairmer.hashnode.dev·Jan 16, 2024Deciphering the Hidden: The Role of AI in Unmasking Obfuscated MalwareIntroduction In the evolving landscape of cybersecurity, the threat of malware and viruses persists as a significant challenge. These malicious entities often employ obfuscated code - a method designed to mask their true purpose and make analysis dif...Discuss·34 readsObfuscated Code
Maria lopazlopazmaria9.hashnode.dev·Dec 20, 2023A Practical Guide to Effective Threat IntelligenceHighlights: Threat Intelligence involves comprehending a threat’s capabilities, infrastructure, motives, objectives, and available resources. Though often linked with expert analysts, the importance of threat intelligence extends to various securit...Discuss·1 likeDetection techniques
The CyberShield Chroniclescyberinsights.hashnode.dev·Dec 8, 2023LogoFAIL Attacks: UEFI Bootkit Intrusion via Bootup LogosThreat Analysis Multiple vulnerabilities collectively named LogoFAIL have been identified, impacting image-parsing components within the UEFI code across various vendors. Researchers emphasize the potential exploitation of these vulnerabilities to co...DiscussLogoFail
Bishwajeet Biswasblog.ethernyte.com·Dec 1, 2023Unraveling the Intricacies of C# DLL Injection Malware: A Deep Dive into Malicious CodeIn the world of cybersecurity, every day is a battle against an evolving army of digital adversaries. Today, we're going to explore the thrilling, mysterious realm of C# DLL Malware. This journey will involve analyzing file hashes, decoding the secre...Discuss·77 reads#cybersecurity
FIKARA BILALbilaldotcom.hashnode.dev·Nov 30, 2023Basic concepts of cybersecurityCybersecurity is the practice of protecting networks, devices, and data from unauthorized access or criminal use. It involves the art of ensuring the confidentiality, integrity, and availability of information and systems. This field aims to safeguar...DiscussMalware