Introduction In this article, we’ll delve into the world of designing and developing malware for macOS, which is essentially a Unix-based operating system. We’ll take a classic approach to exploring Apple’s internals. All you need is a basic understanding of exploitation, along with knowledge of C and Python programming, as well as some familia... Read more 09 Mar 2024 - 52 minute read
In this post we’ll focus on the theory of a technique known as DLL Proxying, dive into offensive security tooling developing & techniques leveraging Rust. I already have post cover Malware Development Essentials for Operators going over some techniques and examples, Check it out, So What the hell is “DLL Proxying”, DLL Proxying is a techniq... Read more 05 Feb 2024 - 8 minute read
Introduction Finally, I’ve got time to share some thoughts that have been on my mind for a while, This article is going to be a bit different – more like an extensive write-up. I’m going to split this into two main sections: Identifying and Analyzing Threats & Vulnerabilities, and Risk Assessment, Let’s talk OPSEC, or Operations Security. F... Read more 16 Dec 2023 - 17 minute read
Introduction This article will delve into fundamental and techniques related to malware development for Windows OS, We’ll start by exploring the WinAPI, understanding how code manipulation works in the context of malware development. We’ll cover things like loading functions dynamically, accessing the Process Environment Block (PEB), and execut... Read more 08 Nov 2023 - 53 minute read
Introduction This article will describe how to develop exploits to target specific vulnerabilities, There are many challenges that you may face when writing exploit code to target specific vulnerabilities, I will go through several phases of exploit development and arrive at a working exploit, When writing exploits, we often need to find overfl... Read more 14 Jul 2023 - 29 minute read