Introduction This is the first post of a series which regards development of malicious software. In this series we will explore and try to implement multiple techniques used by malicious applications to execute code, hide from defenses and persist. Let’s create a C++ application that will run...
Introductory guide to FUD malware concepts and C2 toolkit for ethical Red Team labs. Covers language trade-offs, TCP handlers, and required testing setup
Socials Twitter: https://twitter.com/Mako_Sec GitHub: https://github.com/MakoSec Disclaimer This post talks about Malware Development in a strictly red teaming manner and is intended for people who are infecting systems with the consent of those who own them. Introduction As I continue to work...