o88 ooooooo ooooooo oooooooo8 oooo oooo ooooooooo8 oo oooooo oooooooo8 oooo oo oooooo ooooooo o88 888o o88 888o 888oooooo8 888 888 888oooooo8 888 888 888ooooooo 888 888 888 888 888 88888o 88888o 888 888 888 888 888 888 888 888 888 888 88o o888 88o o888 88oooo888 888 88oooo888 o888o 88oooooo88 o888o o888o o888o 88ooo888 88ooo88 88ooo88
19/09/2024(Anti-)Anti-Rootkit Techniques - Part II: Stomped Drivers and Hidden Threads
23/03/2024(Anti-)Anti-Rootkit Techniques - Part I: UnKovering mapped rootkits
25/02/2024Keylogging in the Windows kernel with undocumented data structures
01/10/2023.NET Assembly Obfuscation for Memory Scanner Evasion
[External Link]
18/03/2023Abusing the GPU for Malware with OpenCL
25/11/2022Windows Access Tokens: Getting SYSTEM and demystifying Potato Exploits
30/08/2022Avoiding direct syscall instructions by using trampolines
03/11/2024Automating Deobfuscation of XorStringsNet
[.NET | Deobfuscation]
13/10/2024Unpacking Snake Keylogger
[.NET | Infostealer]
XX/YY/2024FlareOn 11: Coming soon
16/06/2024Maldev: Packer Development @ x33fcon 2024 with @ShitSecure
[Workshop]
12/04/2023Intro to Syscalls for Windows Malware @ Prelude Discord
[Talk]
---