Writing a Self-Mutating Malware

In this article, we’ll cover Self-mutating/self-modifying malware with the simplest obfuscation techniques out there, covering some characteristics of both polymorphic and metamorphic. Since I’ve discussed malware in previous articles, I’ll stick to the usual routine: giving a brief overview of how the “malware” operates, providing a few example... Read more

MacOS Malware Development: 0x01

In today’s post, We’ll explore the process of designing and developing malware for macOS, We’ll use a classic approach to understanding Apple’s internals. To follow along, you should have a basic understanding of exploitation, as well as knowledge of C and Python programming, and some familiarity with low-level assembly language. While the topic... Read more

Malware Development Essentials for Operators

This post will focus on understanding code manipulation in malware development. We’ll cover topics such as dynamically loading functions, accessing the Process Environment Block (PEB), and executing code. We’ll also explore obfuscation and payload encoding techniques, including XOR and AES encryption, to make our malicious code harder to detect.... Read more

Exploit Development Essentials

This article will explain how to create exploits to target specific vulnerabilities. Developing exploit code can be challenging, and we’ll go through several stages to create a working exploit. When writing exploits, we often need to identify overflows in programs, which usually involve buffer or stack overflows. We look for two key things: our ... Read more