#MalwareDevelopment

2026-03-07

If the Kardashians launched their own framework it would be Kommand and Kontrol (K2).

The Momager (Kris.exe or Kris.sh): The primary C2 listener.
The Glow Up: Privesc
Keeping Up: Lateral movement

#C2Framework #RedTeaming #PostExploitation #MalwareDevelopment #Infosec #CyberSecurity #EDRBypass #ActiveDirectory #PenTesting #ThreatHunting #MITREATTACK #APTHunting #Shellcode #ZeroDay #Persistence #Exfiltration #BlueTeam #PurpleTeaming #kardashians

2026-03-04

I'm giving a remote presentation to the BSD masochistsWusers in New York City in an hour about weird code injection techniques on #FreeBSD

nycbug.org/media/March2026NYCB

Jitsi meeting link: jitsi.sdf.org/NYCBUG-2026-03-0

YouTube stream: youtube.com/watch?v=QfGdMrmy0j

#infosec #HardenedBSD #MalwareDevelopment #MalDev

Kevin Karhan :verified:kkarhan@infosec.space
2025-05-30

@mrgrumpymonkey Obviously I'm not into #MalwareDevelopment (even tho I'd not consider a "#MigrationWare" that forcibly replaces #Windows with #Linux malicious per-se, it's certainly violating #consent and thus is #malware!) simply because that isn't being appreciated in my juristiction and I do kinda need a clean record to be employable in the only field I'm decent in.

  • But hey, someone else can do that...

#sarcasm

Lenin alevski 🕵️💻alevsk@infosec.exchange
2025-05-28

New Open-Source Tool Spotlight 🚨🚨🚨

ScareCrow: A framework for crafting payloads designed to bypass Endpoint Detection and Response (EDR). It flushes EDR hooks in DLLs using methods like `VirtualProtect` & indirect syscalls, ensuring stealth execution. Written in Go, it even uses obfuscation tools like Garble. #CyberSecurity #MalwareDevelopment

🔗 Project link on #GitHub 👉 github.com/Tylous/ScareCrow

#Infosec #Cybersecurity #Software #Technology #News #CTF #Cybersecuritycareer #hacking #redteam #blueteam #purpleteam #tips #opensource #cloudsecurity

— ✨
🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️

2025-02-16

Hiding Shellcode in Image Files with Python and C/C++ -> Now Even Stealthier Without WinAPIs

Check it out here:
🔗 GitHub Repository:
👉 github.com/WafflesExploits/hid
🔗 Full Guide Explaining the Code:
👉 wafflesexploits.github.io/post

Happy hacking! 😀

#Cybersecurity #MalwareDevelopment #Steganography #RedTeam
#EDREvasion #Python #C #Hacking #PayloadHiding #PenetrationTesting

Who Let The Dogs Out 🐾ashed@mastodon.ml
2023-11-05

**Development and persistence of malware in the system-3**

This is a series of articles about the development and persistence of malware in the system:

(attack.mitre.org/tactics/TA000)
🛡For educational purposes only!

🦠Part 13 (cocomelonc.github.io/malware/2) (Hijacking uninstall logic for application) +📔 source code
(github.com/cocomelonc/2022-10-)
🦠Part 14 (cocomelonc.github.io/malware/2) (Event Viewer help link ) +📔 source code
(github.com/cocomelonc/2022-10-)
🦠Part 15 (cocomelonc.github.io/malware/2) (Internet Explorer ) +📔 source code
(github.com/cocomelonc/2022-10-)
🦠Part 16 (cocomelonc.github.io/malware/2) (PowerShell profile) +📔 source code

💥Before reading, I advise you to familiarize yourself with the persistence tactics from MITRE ATT&CK

#malwareDevelopment #CPP #PS #Hijack #APT29

Who Let The Dogs Out 🐾ashed@mastodon.ml
2023-11-05

**Development and persistence of malware in the system-2**

This is a series of articles about the development and persistence of malware in the system:

(attack.mitre.org/tactics/TA000)
🛡For educational purposes only!

🦠Part 7 (cocomelonc.github.io/tutorial/) (Winlogon) +📔 source code
(github.com/cocomelonc/2022-06-)
🦠Part 8 (cocomelonc.github.io/tutorial/) (Port monitors) +📔 source code
(github.com/cocomelonc/2022-06-)
🦠Part 9 (cocomelonc.github.io/malware/2) (Default file extension hijacking) +📔 source code
(github.com/cocomelonc/2022-08-)
🦠Part 10 (cocomelonc.github.io/malware/2) (Using Image File Execution Options) +📔 source code
(github.com/cocomelonc/2022-09-)
🦠Part 11 (cocomelonc.github.io/malware/2) (PowerShell profile) +📔 source code
(github.com/cocomelonc/2022-09-)
🦠Part 12 (cocomelonc.github.io/malware/2) (Accessibility Features) +📔 source code
(github.com/cocomelonc/2022-09-)

💥Before reading, I advise you to familiarize yourself with the persistence tactics from MITRE ATT&CK

#malwareDevelopment #CPP #PS #Hijack #APT29

Who Let The Dogs Out 🐾ashed@mastodon.ml
2023-11-05

**Development and persistence of malware in the system-1**

This is a series of articles about the development and persistence of malware in the system:

(attack.mitre.org/tactics/TA000)
🛡For educational purposes only!

🦠Part 1 (cocomelonc.github.io/tutorial/) (Registry run keys) +📔 source code
(github.com/cocomelonc/2022-04-)
🦠Part 2 (cocomelonc.github.io/tutorial/) (Screensaver hijack) +📔 source code
(github.com/cocomelonc/2022-04-)
🦠Part 3 (cocomelonc.github.io/tutorial/) (COM DLL hijack) +📔 source code
(github.com/cocomelonc/2022-05-)
🦠Part 4 (cocomelonc.github.io/tutorial/) (Windows services) +📔 source code
(github.com/cocomelonc/2022-05-)
🦠Part 5 (cocomelonc.github.io/tutorial/) (AppInit_DLLs) +📔 source code
(github.com/cocomelonc/2022-05-)
🦠Part 6 (cocomelonc.github.io/tutorial/) (Windows netsh helper DLL) +📔 source code
(github.com/cocomelonc/2022-05-)

💥Before reading, I advise you to familiarize yourself with the persistence tactics from MITRE ATT&CK

#malwareDevelopment #CPP #PS #Hijack #APT29

2023-08-25

An excellent, practical in-depth explanation of Hell’s Gate technique:

labs.en1gma.co/malwaredevelopm

The direct syscalls provided by this method were relatively easy to turn into indirect ones by borrowing some code here:

github.com/VirtualAlllocEx/DEF

#cybersecurity #malwaredevelopment #redteam

2023-07-03

Currently looking to hone my Malware Development skills. Anyone have strong feelings on Sektor7¹ versus MalDevAcademy²? I'm aware it's unlikely many folks have taken both but hoping someone can steer me.

_______
¹ institute.sektor7.net/
² maldevacademy.com/

#redteam #training #malware #malwaredevelopment

2022-12-13

Been enjoying taking the Sektor7 malware development course (not sure if they’re on mastodon).

For those getting into malware analysis and aren’t fans of the “go learn C and build a hello world program” track, this course might pique your interest since it’s deliberately creating malware.

Particularly nice to learn first hand where payloads can get stored, how cryptography actually gets used, and then extrapolate how to detect those things.

This blog is a good read in general, and does a good job explaining some of what one can learn in the course: assume-breach.medium.com/home-

#malwareanalysis #malware #malwaredevelopment

Course is here (note I’m not affiliated with Sektor7 and this is not an ad lol) institute.sektor7.net/red-team

2022-11-22

I've been running around like a crazy person recently but this #golang malware dev presentation needs to join my question above.

"Offensive Golang Bonanza" by @awgh youtu.be/oCdaOLmKu6s

Sorry to anyone who isn't as interested in Go as I am. Please feel free to add other presentations because I will definitely watch them.

#malwaredevelopment #hacktheplanet

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst