hello guys
I want creating my first FUD Crypter using C++
is that any source code for this issue ?
I want creating my first FUD Crypter using C++
is that any source code for this issue ?
Hmmm interesting, i never heard about "Network defense or Rootkits/Bootkits" crypting or obfuscation method.you can but if you want a shorter time and full power you need to reversing the Anti-Virtus to understand how it works when a file is found, but there are recommended techniques such as:
Obfuscation / Encryption & Encoding | Build your one algorithm or use XOR , AES & B64
store your payload in sections PE like .text, .data etc..
Anti Debugging
Obuscation Calls
Packers
RPM Injection
Reflective DLL Injection
Process Hollowing
Inline Hooking
Network Defense
Rootkits/Bootkits
and more and for sure that's a few of teq
and read windows internals and hacking exposed malware good luck
hmmm i brought up most evasion methodsHmmm interesting, i never heard about "Network defense or Rootkits/Bootkits" crypting or obfuscation method.
Im sure you have done ctrl+c and ctrl+v without reading.
i think u didn't go to malware deep so you should revise your information a bit see it https://www.amazon.com/Rootkits-Sub...&qid=1670291865&sprefix=rootki,aps,291&sr=8-2 rootkitsHmmm interesting, i never heard about "Network defense or Rootkits/Bootkits" crypting or obfuscation method.
Im sure you have done ctrl+c and ctrl+v without reading.
true that the published techniques crypter are used for learn and not to use, because will be detected sometimes and will not give you a 0/0 resultThis point has nothing to do with the topic of the question.
Rootkits exist to hide other malware. Bootkits are a low-level way to persist in a compromised system, thanks to them we have the possibility to bypass (disable) some internal OS protection mechanisms and, therefore, to unload our own modules into the OS address space. This is a very broad, but highly specialized topic, about which we can argue for a very long time.
Specifically on the author's question. There used to be an Adrena Crypter source on github, you can try to find it there. Also, there are some articles by Octavian on this forum, where he explains the idea of writing this kind of software.
I dont think so.i think u didn't go to malware deep so you should revise your information a bit see it https://www.amazon.com/Rootkits-Subverting-Windows-Greg-Hoglund/dp/0321294319/ref=sr_1_2?crid=1K7T6A8CQIFVI&keywords=rootkit&qid=1670291865&sprefix=rootki,aps,291&sr=8-2 rootkits
nah i mean do obfuscation in rootkits and a rootkits good method even without obfuscationI dont think so.
You gave "Rootkits" as a example of encryption/obfuscation method, which mean you dont have any idea what are you Talking about.
Wow, how much you know about it?) Maby you have some private tools coded from scratch?you can but if you want a shorter time and full power you need to reversing the Anti-Virtus to understand how it works when a file is found, but there are recommended techniques such as:
Obfuscation / Encryption & Encoding | Build your one algorithm or use XOR , AES & B64
store your payload in sections PE like .text, .data etc..
Anti Debugging
Obuscation Calls
Packers
RPM Injection
Reflective DLL Injection
Process Hollowing
Inline Hooking
Network Defense
Rootkits/Bootkits
and more and for sure that's a few of teq
and read windows internals and hacking exposed malware good luck
if you wanna my skills np to education u but i specialize in reverse engineering de/obfuscation,kernel exploitation & UEFI if u need help I don't have problemWow, how much you know about it?) Maby you have some private tools coded from scratch?
how much $$$?Any Senior C++/asm coder is welcome. DM me, if you have such skills, we could bring you to our private team, where you will get $$$ and improve your skills.
you know any good fud crypter even its paidyou can but if you want a shorter time and full power you need to reversing the Anti-Virtus to understand how it works when a file is found, but there are recommended techniques such as:
Obfuscation / Encryption & Encoding | Build your one algorithm or use XOR , AES & B64
store your payload in sections PE like .text, .data etc..
Anti Debugging
Obuscation Calls
Packers
RPM Injection
Reflective DLL Injection
Process Hollowing
Inline Hooking
Network Defense
Rootkits/Bootkits
and more and for sure that's a few of teq
and read windows internals and hacking exposed malware good luck