Skip to content

leetCipher/Malware.development

Repository files navigation

Malware development

Malware attacks/techniques explained.

Attacks/Techniques explained (Windows)

  • Self-injection
  • Process injection
  • Local DLL injection/Self-DLL injection
  • Remote DLL injection/DLL injector
  • Using executable resources to hide images with embedded shellcode
  • DLL Proxing
  • Default txt extension hijacking
  • PE headers eradication
  • Dynamically filling PE code with NOPs

Attacks/Techniques explained (Linux)

  • Process self-injection
  • Shellcode development (32-bit)
  • Shellcode development (64-bit)

Series Playlist

About

Malware attacks/techniques explained

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors