Advertisement
Guest User

Untitled

a guest
Apr 8th, 2020
1,507
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.35 KB | None | 0 0
  1. https[:]//docs.microsoft.com/en-us/archive/msdn-magazine/2002/march/inside-windows-an-in-depth-look-into-the-win32-portable-executable-file-format-part-2
  2. https[:]//blahcat.github.io/2019/03/17/small-dumps-in-the-big-pool/
  3. https[:]//www.fuzzysecurity.com/tutorials/16.html
  4. https://blog.ropnop.com/hosting-clr-in-golang/
  5. https[:]//evasions.checkpoint.com/
  6. http[:]//www.catb.org/esr/faqs/hacker-howto.html
  7. https[:]//vx-underground.org/
  8. http[:]//sq.ro/malwarez.htm#
  9. https[:]//github.com/d30sa1/RootKits-List-Download
  10. https[:]//github.com/christian-roggia/open-myrtus
  11. https[:]//www.youtube.com/watch?v=8dZFJEc-8uI
  12. https[:]//unit42.paloaltonetworks.com/imminent-monitor-a-rat-down-under/
  13. https[:]//unit42.paloaltonetworks.com/unit42-orcus-birth-of-an-unusual-plugin-builder-rat/
  14. https[:]//unit42.paloaltonetworks.com/unit42-rat-trapped-luminositylink-falls-foul-vermin-eradication-efforts/
  15. https[:]//unit42.paloaltonetworks.com/the-legend-of-adwind-a-commodity-rat-saga-in-eight-parts/
  16. https[:]//unit42.paloaltonetworks.com/?search_field=Silverterrier
  17. https[:]//unit42.paloaltonetworks.com/the-gopher-in-the-room-analysis-of-golang-malware-in-the-wild/
  18. https[:]//unit42.paloaltonetworks.com/new-python-based-payload-mechaflounder-used-by-chafer/
  19. http[:]//index-of.es/ (Probably one of the biggest repositary of books about hacking/Dev)
  20. https[:]//en.wikipedia.org/wiki/Embarrassingly_parallel
  21. https[:]//en.wikipedia.org/wiki/Cult_of_the_Dead_Cow
  22. https[:]//www.youtube.com/watch?v=gdSlcxxYAA8
  23. https[:]//www.youtube.com/user/GynvaelEN/videos
  24. https[:]//www.youtube.com/watch?v=e0D20L8XK3k
  25. https[:]//www.youtube.com/watch?v=9nlWbDdxKjw
  26. https[:]//github.com/alphaSeclab/awesome-rat
  27. https[:]//pagedout.institute/
  28. https[:]//www.youtube.com/channel/UCLDnEn-TxejaDB8qm2AUhHQ/videos
  29. https[:]//github.com/NationalSecurityAgency
  30. https[:]//krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/
  31. https[:]//danluu.com/cpu-backdoors/
  32. https[:]//www.cl.cam.ac.uk/~sps32/sec_news.html#Assurance
  33. https[:]//media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask#t=2177
  34. https[:]//www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A/videos
  35. https[:]//stackoverflow.com/questions/11925142/is-it-possible-for-evolutionary-algorithms-to-create-machine-code
  36. https[:]//www.tandfonline.com/doi/abs/10.1080/0952813X.2017.1354078?scroll=top&needAccess=true&journalCode=teta20
  37. https[:]//www.tandfonline.com/doi/full/10.1080/0952813X.2017.1354078?scroll=top&needAccess=true
  38. http[:]//www.[]primaryobjects.com/2018/09/03/creating-self-assembling-code-with-genetic-programming/
  39. https://www[.]elastic.co/fr/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
  40. https[:]//www.youtube.com/watch?v=MZloJByL9s0
  41. https[:]//github.com/malwares/Remote-Access-Trojan
  42. https{][:]//github.com/malwares/Botnet
  43. https[:]//github.com/maestron/botnets
  44. https[:]//github.com/RamadhanAmizudin/malware
  45. https[:][//github.com/RPISEC/Malware
  46. https[:][//github.com/vitalysim/Awesome-Hacking-Resources
  47. https[:]//www.youtube.com/watch?v=fryYNnaUUZE
  48. https[:]//github.com/kikithegecko/turnipschool-casing
  49. https[:]//www.youtube.com/watch?v=E28V1t-k8Hk&feature=emb_logo
  50. https[:]//www.youtube.com/watch?v=oktnyJ72A-U
  51. https[:]//www.youtube.com/watch?v=h07iXD-aSCA
  52. https[:]//en.wikipedia.org/wiki/Differential_calculus
  53. https[:]//www.youtube.com/watch?v=wvoxjkTNOXE ( For inspiration and work ethics)
  54. https[:]//github.com/guffre/shellcode_launcher
  55. https[:]//blog.didierstevens.com/programs/shellcode/
  56. https[:]//www.youtube.com/watch?v=RJrxue6LnwE
  57. https[:]//github.com/amitwaisel/Malproxy
  58. https[:]//krebsonsecurity.com/2016/07/canadian-man-is-author-of-popular-orcus-rat/
  59. https[:]//github.com/rootm0s/Protectors
  60. https[:]//github.com/x64dbg/ScyllaHide
  61. https[:]//github.com/mrexodia/titanhide
  62. https[:]//blog.f-secure.com/analyzing-the-doublepulsar-kernel-dll-injection-technique/
  63. https[:]//www.youtube.com/user/L4DL4D2EUROPE/videos
  64. https[:]//rastamouse.me/tags/tikitorch/
  65. https[:]//github.com/stephenfewer
  66. https[:]//github.com/fancycode/MemoryModule/tree/d88817fbf7debbd0a0c2f5cc6e193f3a38f1d114
  67. https[:]//rastamouse.me/2018/10/amsiscanbuffer-bypass-part-1/
  68. https[:]//github.com/jephthai/EvilVM/
  69. https[:]//www.youtube.com/embed/55234oZ0EDU
  70. https[:]//www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement