This section contains articles that explore modern malware techniques. This includes concepts behind code injection strategies, evasion techniques, kernel‑level manipulation, persistence mechanisms, and command‑and‑control communication.
- Blocking EDR TrafficUsing the Windows Filtering Platform to block EDR traffic.
- Driver Signature EnforcementBypassing DSE using vulnerable drivers.
- Protected Process LightExamining the PPL Windows security feature.
- Killing Protected ProcessesExploiting kernel mode drivers to terminate protected processes.
- Kernel Mode DriversCreating a Windows kernel mode driver to hide and kill processes.
- Windows Kernel DebuggingModifying Kernel data structures to hide processes and elevate privileges.
- AppDomainManager InjectionExecuting arbitrary code inside a .NET process.
- Android Remote AccessCreating an APK to gain remote access to an Android 14 device.
- DLL ProxyingUsing DLL’s as a persistence mechanism.
- LLVM ObfuscationSetting up Obfuscator LLVM with Visual Studio 2022.
- Encoding Shellcode as IP AddressesConverting shellcode to look like a series of IP addresses.
- Function Name HashingReplacing existing ROR13 function hash names in shellcode to evade signature based detection.
- Module StompingExecuting Shellcode from the address space of known good DLL’s.
- Callback Shellcode ExecutionExecuting Shellcode using function callbacks.
- Inline Function HookingCreating a C++ DLL to modify a target applications behaviour.
- Disguising Client Side PayloadsWays of making payloads a little less suspicious.
- User Mode APC Queue InjectionUsing user-mode APC functions to execute code in remote processes.
- Sleep MasksWriting sleep masks in x64 assembly.
- Offensive PowerShellUsing GetDelegateForFunctionPointer to execute Win32 API’s from memory in Powershell.
- Reflective DLL InjectionExecuting DLL’s from memory.
- DLL InjectionInjecting DLL’s into remote processes.
- Interacting with Foreign HandlersWriting stagers to interact with foreign C2 frameworks.
- Persistence MechanismsMaintaining access to a target system.
- Password FiltersUsing password filters to intercept logon credentials.
- Keystroke LoggingLogging Keystrokes with SetWindowHookEx.
- Process Mitigation Policies & ACGAttempting to use binary signature policies and arbitrary code guard to bypass userland hooks.
- Parent Process ID SpoofingSupplying arbitrary PPID values to CreateProcess.
- Shellcode ObfuscationEncoding Shellcode for use within malware.
- Import Address TablesHiding IAT entries to evade detection.
- Malicious Nim CodeUsing Nim to write some simple tools.
- System Call ExecutionWriting a process injection tool using direct system calls.
- ClickOnce DroppersCreating a ClickOnce installer for Phishing campaigns.
- NT API Shellcode ExecutionProcess Injection using NtCreateSection and NtMapViewOfSection.
- Access Token ManipulationAssuming other users identities by copying access tokens.
- Shellcode Execution via FibersUsing fibers instead of threads to run shellcode.
- Process Argument SpoofingModifying the Process Environment Block for process argument spoofing.
- Windows Defender Memory Scanning EvasionEvading Windows Defender memory scanning.
- Process InjectionCreateRemoteThread Process Injection in C#
- Unhooking Event Tracing for WindowsBypassing ETW userland hooks.
- Assembly.Load & AMSIBypassing AMSI when using Assembly.Load.
- DNS TunnelingUsing the Domain Name System as a Command & Control mechanism.
- ICMP TunnelingTunneling C2 messages in ICMP traffic.