MalDev

Malware Development

ko-fiarrow-up-right

Introduction to C

Windows API

Syscalls

Trampolines

Shellcode

Web-based Payload Staging

DLL Hijacking / DLL Sideloading

DLL Hijackingchevron-right

DLL Proxying

Reduce entropy and obfuscate

Workshop

Resources

Videos

Interesting Books

Interesting Bookschevron-right
circle-info

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

  • Malware Development for Ethical Hackersarrow-up-right Packed with real-world examples, this book simplifies cybersecurity, delves into malware development, and serves as a must-read for advanced ethical hackers

  • Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systemsarrow-up-right The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fiarrow-up-right

buymeacoffeearrow-up-right

Last updated