Malware

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections. Each section is encrypted individually…

3 months ago

Capa v7.3.0 – Enhanced Malware Analysis With VMRay Integration, Ghidra Support, And New Capa Rules Website

The v7.3.0 capa release comes with the following three major enhancements: 1. Support For VMRay Sandbox Analysis Archives Unlock powerful…

5 months ago

Prince Ransomware – A New Threat In Cybersecurity

Prince now has a Windows Defender flag, namely "Ransom:Win64/PrinceRansom.YAA!MTB". This means that Prince Ransomware will no longer bypass Windows Defender…

5 months ago

Process Injection Techniques – For Advanced Adversary Emulation

Usman Sikander (a.k.a Offensive-Panda) is a seasoned security professional specializing in adversary emulation, malware development, malware analysis, and red teaming.…

5 months ago

SharpIncrease – Mastering Malware Obfuscation To Bypass Security Detection

Adversaries may use binary padding to add junk data and change the on-disk representation of malware. This can be done…

8 months ago

T1036.005 – Masquerading : Match Legitimate Name Or Location

In the cybersecurity landscape, attackers constantly devise methods to bypass security measures. One sophisticated technique is T1036.005, or Masquerading: Match…

11 months ago

ChaiLdr – AV Evasive Payload Loader : Unveiling Next-Gen Evasion Capabilities

ChaiLdr - AV Evasive Payload Loader represents a cutting-edge approach in malware development, blending innovative evasion techniques to bypass modern…

11 months ago

Banshee – A Foray Into Kernel-Level Power With Rootkit Techniques

Learning about Windows rootkits lately, so here is my own implementation of some techniques. For an overview, see Features below. Banshee is…

11 months ago

Awesome Malware Analysis – The Ultimate Resource For Tools, Techniques, And Insights

A curated list of awesome malware analysis tools and resources. Inspired by awesome-python and awesome-php. Malware Collection Anonymizers Honeypots Malware Corpora Open Source…

12 months ago

Anti-Qakbot – Disabling The Malicious Threat

Kill a live running QAKbot on an infected machine. More on this : Operation Duckhunt : Field Testing the FBI’s Anti-Qakbot…

1 year ago