MacOS X Malware Development

Introduction In this article, we’ll delve into the world of designing and developing malware for macOS, which is essentially a Unix-based operating system. We’ll take a classic approach to exploring Apple’s internals. All you need is a basic understanding of exploitation, along with knowledge of C and Python programming, as well as some familia... Read more

DLL-Load Proxying

In this post we’ll focus on the theory of a technique known as DLL Proxying, dive into offensive security tooling developing & techniques leveraging Rust. I already have post cover Malware Development Essentials for Operators going over some techniques and examples, Check it out, So What the hell is “DLL Proxying”, DLL Proxying is a techniq... Read more

An Overview of Operations security (OPSEC)

Introduction Finally, I’ve got time to share some thoughts that have been on my mind for a while, This article is going to be a bit different – more like an extensive write-up. I’m going to split this into two main sections: Identifying and Analyzing Threats & Vulnerabilities, and Risk Assessment, Let’s talk OPSEC, or Operations Security. F... Read more

Malware Development Essentials for Operators

Introduction This article will delve into fundamental and techniques related to malware development for Windows OS, We’ll start by exploring the WinAPI, understanding how code manipulation works in the context of malware development. We’ll cover things like loading functions dynamically, accessing the Process Environment Block (PEB), and execut... Read more

Exploit Development Essentials

Introduction This article will describe how to develop exploits to target specific vulnerabilities, There are many challenges that you may face when writing exploit code to target specific vulnerabilities, I will go through several phases of exploit development and arrive at a working exploit, When writing exploits, we often need to find overfl... Read more