sueden.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Eine Community für alle, die sich dem Süden hingezogen fühlen. Wir können alles außer Hochdeutsch.

Serverstatistik:

1,8 Tsd.
aktive Profile

#malwaredevelopment

0 Beiträge0 Beteiligte0 Beiträge heute
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://mastodon.social/@mrgrumpymonkey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>mrgrumpymonkey</span></a></span> Obviously I'm not into <a href="https://infosec.space/tags/MalwareDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareDevelopment</span></a> (even tho I'd not consider a <em>"<a href="https://infosec.space/tags/MigrationWare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MigrationWare</span></a>"</em> that forcibly replaces <a href="https://infosec.space/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> with <a href="https://infosec.space/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> malicious <em>per-se</em>, it's certainly violating <a href="https://infosec.space/tags/consent" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>consent</span></a> and thus is <a href="https://infosec.space/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a>!) simply because that isn't being appreciated in my juristiction and I do kinda need a clean record to be employable in the only field I'm decent in.</p><ul><li>But hey, someone else can do that... </li></ul><p><a href="https://infosec.space/tags/sarcasm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sarcasm</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>ScareCrow: A framework for crafting payloads designed to bypass Endpoint Detection and Response (EDR). It flushes EDR hooks in DLLs using methods like `VirtualProtect` &amp; indirect syscalls, ensuring stealth execution. Written in Go, it even uses obfuscation tools like Garble. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/MalwareDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareDevelopment</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/Tylous/ScareCrow" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/Tylous/ScareCrow</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
WafflesExploits<p>Hiding Shellcode in Image Files with Python and C/C++ -&gt; Now Even Stealthier Without WinAPIs</p><p>Check it out here:<br>🔗 GitHub Repository:<br>👉 <a href="https://github.com/WafflesExploits/hide-payload-in-images" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/WafflesExploits/hid</span><span class="invisible">e-payload-in-images</span></a><br>🔗 Full Guide Explaining the Code:<br>👉 <a href="https://wafflesexploits.github.io/posts/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">wafflesexploits.github.io/post</span><span class="invisible">s/Hide_a_Payload_in_Plain_Sight_Embedding_Shellcode_in_a_Image_file/</span></a></p><p>Happy hacking! 😀</p><p><a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/MalwareDevelopment" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MalwareDevelopment</span></a> <a href="https://infosec.exchange/tags/Steganography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Steganography</span></a> <a href="https://infosec.exchange/tags/RedTeam" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RedTeam</span></a> <br><a href="https://infosec.exchange/tags/EDREvasion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EDREvasion</span></a> <a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> <a href="https://infosec.exchange/tags/C" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>C</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/PayloadHiding" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PayloadHiding</span></a> <a href="https://infosec.exchange/tags/PenetrationTesting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PenetrationTesting</span></a></p>