Skip to content

Instantly share code, notes, and snippets.

@namishelex01
Created May 15, 2020 13:26
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 2 You must be signed in to fork a gist
  • Save namishelex01/01fde21147e53589c48c65e4d3e025f8 to your computer and use it in GitHub Desktop.
Save namishelex01/01fde21147e53589c48c65e4d3e025f8 to your computer and use it in GitHub Desktop.
https[:]//docs.microsoft.com/en-us/archive/msdn-magazine/2002/march/inside-windows-an-in-depth-look-into-the-win32-portable-executable-file-format-part-2
https[:]//blahcat.github.io/2019/03/17/small-dumps-in-the-big-pool/
https[:]//www.fuzzysecurity.com/tutorials/16.html
https://blog.ropnop.com/hosting-clr-in-golang/
https[:]//evasions.checkpoint.com/
http[:]//www.catb.org/esr/faqs/hacker-howto.html
https[:]//vx-underground.org/
http[:]//sq.ro/malwarez.htm#
https[:]//github.com/d30sa1/RootKits-List-Download
https[:]//github.com/christian-roggia/open-myrtus
https[:]//www.youtube.com/watch?v=8dZFJEc-8uI
https[:]//unit42.paloaltonetworks.com/imminent-monitor-a-rat-down-under/
https[:]//unit42.paloaltonetworks.com/unit42-orcus-birth-of-an-unusual-plugin-builder-rat/
https[:]//unit42.paloaltonetworks.com/unit42-rat-trapped-luminositylink-falls-foul-vermin-eradication-efforts/
https[:]//unit42.paloaltonetworks.com/the-legend-of-adwind-a-commodity-rat-saga-in-eight-parts/
https[:]//unit42.paloaltonetworks.com/?search_field=Silverterrier
https[:]//unit42.paloaltonetworks.com/the-gopher-in-the-room-analysis-of-golang-malware-in-the-wild/
https[:]//unit42.paloaltonetworks.com/new-python-based-payload-mechaflounder-used-by-chafer/
http[:]//index-of.es/ (Probably one of the biggest repositary of books about hacking/Dev)
https[:]//en.wikipedia.org/wiki/Embarrassingly_parallel
https[:]//en.wikipedia.org/wiki/Cult_of_the_Dead_Cow
https[:]//www.youtube.com/watch?v=gdSlcxxYAA8
https[:]//www.youtube.com/user/GynvaelEN/videos
https[:]//www.youtube.com/watch?v=e0D20L8XK3k
https[:]//www.youtube.com/watch?v=9nlWbDdxKjw
https[:]//github.com/alphaSeclab/awesome-rat
https[:]//pagedout.institute/
https[:]//www.youtube.com/channel/UCLDnEn-TxejaDB8qm2AUhHQ/videos
https[:]//github.com/NationalSecurityAgency
https[:]//krebsonsecurity.com/2017/01/who-is-anna-senpai-the-mirai-worm-author/
https[:]//danluu.com/cpu-backdoors/
https[:]//www.cl.cam.ac.uk/~sps32/sec_news.html#Assurance
https[:]//media.ccc.de/v/34c3-9058-everything_you_want_to_know_about_x86_microcode_but_might_have_been_afraid_to_ask#t=2177
https[:]//www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A/videos
https[:]//stackoverflow.com/questions/11925142/is-it-possible-for-evolutionary-algorithms-to-create-machine-code
https[:]//www.tandfonline.com/doi/abs/10.1080/0952813X.2017.1354078?scroll=top&needAccess=true&journalCode=teta20
https[:]//www.tandfonline.com/doi/full/10.1080/0952813X.2017.1354078?scroll=top&needAccess=true
http[:]//www.[]primaryobjects.com/2018/09/03/creating-self-assembling-code-with-genetic-programming/
https://www[.]elastic.co/fr/blog/ten-process-injection-techniques-technical-survey-common-and-trending-process
https[:]//www.youtube.com/watch?v=MZloJByL9s0
https[:]//github.com/malwares/Remote-Access-Trojan
https{][:]//github.com/malwares/Botnet
https[:]//github.com/maestron/botnets
https[:]//github.com/RamadhanAmizudin/malware
https[:][//github.com/RPISEC/Malware
https[:][//github.com/vitalysim/Awesome-Hacking-Resources
https[:]//www.youtube.com/watch?v=fryYNnaUUZE
https[:]//github.com/kikithegecko/turnipschool-casing
https[:]//www.youtube.com/watch?v=E28V1t-k8Hk&feature=emb_logo
https[:]//www.youtube.com/watch?v=oktnyJ72A-U
https[:]//www.youtube.com/watch?v=h07iXD-aSCA
https[:]//en.wikipedia.org/wiki/Differential_calculus
https[:]//www.youtube.com/watch?v=wvoxjkTNOXE ( For inspiration and work ethics)
https[:]//github.com/guffre/shellcode_launcher
https[:]//blog.didierstevens.com/programs/shellcode/
https[:]//www.youtube.com/watch?v=RJrxue6LnwE
https[:]//github.com/amitwaisel/Malproxy
https[:]//krebsonsecurity.com/2016/07/canadian-man-is-author-of-popular-orcus-rat/
https[:]//github.com/rootm0s/Protectors
https[:]//github.com/x64dbg/ScyllaHide
https[:]//github.com/mrexodia/titanhide
https[:]//blog.f-secure.com/analyzing-the-doublepulsar-kernel-dll-injection-technique/
https[:]//www.youtube.com/user/L4DL4D2EUROPE/videos
https[:]//rastamouse.me/tags/tikitorch/
https[:]//github.com/stephenfewer
https[:]//github.com/fancycode/MemoryModule/tree/d88817fbf7debbd0a0c2f5cc6e193f3a38f1d114
https[:]//rastamouse.me/2018/10/amsiscanbuffer-bypass-part-1/
https[:]//github.com/jephthai/EvilVM/
https[:]//www.youtube.com/embed/55234oZ0EDU
https[:]//www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment