Skip to content

leetCipher/Malware.development

Repository files navigation

Malware development

Malware attacks/techniques explained.

Attacks/Techniques explained

  • Self-injection
  • Process injection
  • Local DLL injection/Self-DLL injection
  • Remote DLL injection/DLL injector
  • Using executable resources to hide images with embedded shellcode
  • DLL Proxing
  • Default txt extension hijacking
  • PE headers eradication
  • Dynamically filling PE code with NOPs

Series Playlist

About

Malware attacks/techniques explained

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published