ctfnote.com
Search
⌃K
/home/ret2basic.eth
Auditing
✅
Ethereum and Solidity
DeFi
Secureum
Beyond Secureum
Audit Findings
Foundry and Hardhat
EVM
MEV
DeFiHackLabs
Research
Red Teaming
✅
Enumeration
✅
Exploitation
✅
Buffer Overflow
✅
Privilege Escalation
✅
Post Exploitation
✅
Pivoting
Active Directory (AD)
Command & Control (C2)
Malware Development
"Hot Dropper"
PE Format
Process Injection
Reflective DLL
x86 <=> x64
Hooking
VeraCry
Offensive C#
AV Evasion
Cryptography
Hash Functions
MAC
AES
Diffie-Hellman
RSA
ECC
Digital Signature
JWT
PRNG
SSL/TLS
Research
Computer Science
Linux
Python
HTML, CSS, JavaScript, and React
C, C++, and C#
Data Structures and Algorithms
The Linux Programming Interface
Computer Systems
Databases
Distributed Systems
Static Analysis
Web
✅
Prerequisites
File Upload
SQL Injection (SQLi)
Cross-Site Scripting (XSS)
CSRF and SSRF
XML External Entities (XXE)
Insecure Deserialization
HTTP Request Smuggling
OS Command Injection
✅
Directory Traversal
HTTP Parameter Pollution
Server-Side Template Injection (SSTI)
LDAP Injection
Redis
Pwn
Linux Exploitation
Windows Exploitation
Fuzzing
Reverse
Bytecode
angr
Powered By
GitBook
Malware Development
Reference
This set of notes was based on Sektor7 Malware Development Essentials and Malware Development Intermediate Course:
SEKTOR7 Institute
SEKTOR7 Institute
Sektor7
and a few other resources:
Categories
0xRick's Blog
win-internals by 0xRick
Previous
C2 Development
Next
"Hot Dropper"
Last modified
15d ago