Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- https[:]//docs.microsoft.com/en-us/archive/msdn-magazine/2002/march/inside-windows-an-in-depth-look-into-the-win32-portable-executable-file-format-part-2
- https[:]//blahcat.github.io/2019/03/17/small-dumps-in-the-big-pool/
- https[:]//www.fuzzysecurity.com/tutorials/16.html
- https://blog.ropnop.com/hosting-clr-in-golang/
- https[:]//evasions.checkpoint.com/
- http[:]//www.catb.org/esr/faqs/hacker-howto.html
- https[:]//vx-underground.org/
- http[:]//sq.ro/malwarez.htm#
- https[:]//github.com/d30sa1/RootKits-List-Download
- https[:]//github.com/christian-roggia/open-myrtus
- https[:]//www.youtube.com/watch?v=8dZFJEc-8uI
- https[:]//unit42.paloaltonetworks.com/imminent-monitor-a-rat-down-under/
- https[:]//unit42.paloaltonetworks.com/unit42-orcus-birth-of-an-unusual-plugin-builder-rat/
- https[:]//unit42.paloaltonetworks.com/unit42-rat-trapped-luminositylink-falls-foul-vermin-eradication-efforts/
- https[:]//unit42.paloaltonetworks.com/the-legend-of-adwind-a-commodity-rat-saga-in-eight-parts/
- https[:]//unit42.paloaltonetworks.com/?search_field=Silverterrier
- https[:]//unit42.paloaltonetworks.com/the-gopher-in-the-room-analysis-of-golang-malware-in-the-wild/
- https[:]//unit42.paloaltonetworks.com/new-python-based-payload-mechaflounder-used-by-chafer/
- http[:]//index-of.es/ (Probably one of the biggest repositary of books about hacking/Dev)
- https[:]//en.wikipedia.org/wiki/Embarrassingly_parallel
- https[:]//en.wikipedia.org/wiki/Cult_of_the_Dead_Cow
- https[:]//www.youtube.com/watch?v=gdSlcxxYAA8
- https[:]//www.youtube.com/user/GynvaelEN/videos
- https[:]//www.youtube.com/watch?v=e0D20L8XK3k
- https[:]//www.youtube.com/watch?v=9nlWbDdxKjw
- https[:]//github.com/alphaSeclab/awesome-rat
- https[:]//pagedout.institute/
- https[:]//www.youtube.com/channel/UCLDnEn-TxejaDB8qm2AUhHQ/videos
- https[:]//github.com/NationalSecurityAgency
- https[:]//krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/
- https[:]//danluu.com/cpu-backdoors/
- https[:]//www.cl.cam.ac.uk/~sps32/sec_news.html#Assurance
- https[:]//media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask#t=2177
- https[:]//www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A/videos
- https[:]//stackoverflow.com/questions/11925142/is-it-possible-for-evolutionary-algorithms-to-create-machine-code
- https[:]//www.tandfonline.com/doi/abs/10.1080/0952813X.2017.1354078?scroll=top&needAccess=true&journalCode=teta20
- https[:]//www.tandfonline.com/doi/full/10.1080/0952813X.2017.1354078?scroll=top&needAccess=true
- http[:]//www.[]primaryobjects.com/2018/09/03/creating-self-assembling-code-with-genetic-programming/
- https://www[.]elastic.co/fr/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
- https[:]//www.youtube.com/watch?v=MZloJByL9s0
- https[:]//github.com/malwares/Remote-Access-Trojan
- https{][:]//github.com/malwares/Botnet
- https[:]//github.com/maestron/botnets
- https[:]//github.com/RamadhanAmizudin/malware
- https[:][//github.com/RPISEC/Malware
- https[:][//github.com/vitalysim/Awesome-Hacking-Resources
- https[:]//www.youtube.com/watch?v=fryYNnaUUZE
- https[:]//github.com/kikithegecko/turnipschool-casing
- https[:]//www.youtube.com/watch?v=E28V1t-k8Hk&feature=emb_logo
- https[:]//www.youtube.com/watch?v=oktnyJ72A-U
- https[:]//www.youtube.com/watch?v=h07iXD-aSCA
- https[:]//en.wikipedia.org/wiki/Differential_calculus
- https[:]//www.youtube.com/watch?v=wvoxjkTNOXE ( For inspiration and work ethics)
- https[:]//github.com/guffre/shellcode_launcher
- https[:]//blog.didierstevens.com/programs/shellcode/
- https[:]//www.youtube.com/watch?v=RJrxue6LnwE
- https[:]//github.com/amitwaisel/Malproxy
- https[:]//krebsonsecurity.com/2016/07/canadian-man-is-author-of-popular-orcus-rat/
- https[:]//github.com/rootm0s/Protectors
- https[:]//github.com/x64dbg/ScyllaHide
- https[:]//github.com/mrexodia/titanhide
- https[:]//blog.f-secure.com/analyzing-the-doublepulsar-kernel-dll-injection-technique/
- https[:]//www.youtube.com/user/L4DL4D2EUROPE/videos
- https[:]//rastamouse.me/tags/tikitorch/
- https[:]//github.com/stephenfewer
- https[:]//github.com/fancycode/MemoryModule/tree/d88817fbf7debbd0a0c2f5cc6e193f3a38f1d114
- https[:]//rastamouse.me/2018/10/amsiscanbuffer-bypass-part-1/
- https[:]//github.com/jephthai/EvilVM/
- https[:]//www.youtube.com/embed/55234oZ0EDU
- https[:]//www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Add Comment
Please, Sign In to add comment