MalDev
Malware Development
Introduction to C
Windows API
Syscalls
Trampolines
Shellcode
Web-based Payload Staging
DLL Hijacking / DLL Sideloading
DLL HijackingDLL Proxying
Reduce entropy and obfuscate
Workshop
Resources
Videos
Interesting Books
Interesting BooksMalware Development for Ethical Hackers Packed with real-world examples, this book simplifies cybersecurity, delves into malware development, and serves as a must-read for advanced ethical hackers
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated