Mapping Malware APIs to Techniques
by xzin0vich - Friday July 19, 2024 at 12:19 PM
#21
thanks for sharing!
Reply
#22
(Jul 19, 2024, 12:19 PM)xzin0vich Wrote: This project can be used when developing malware or when analyzing the source code of one.

"Dissecting Malware API Calls as a Fingerprint"

Thank you for sharing.
Reply
#23
Thanks man I have been searching for something like this
Reply
#24
thank you so much <>___<>
Reply
#25
Thanks for this share.
Reply
#26
thank you very much bro
Reply
#27
thank you brother, i really need this
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [ LIST ] 5 FREE STEALERS WITH PROS/CONS elix 401 17,439 57 minutes ago
Last Post: kkkreoifezrg
  Rust Based Windows Kernel Rootkit Loki 133 10,254 Today, 12:12 AM
Last Post: kffnyx
  Xordium stealer for Pulsar v2.4.5 nullvex 34 2,053 Yesterday, 05:51 PM
Last Post: imaferrari
  Phishing Platform with 2FA bypass support Loki 143 23,371 Yesterday, 11:04 AM
Last Post: Haier
  Bypass AV and EDR - Halos Gate from Sektor7 0x01 126 11,954 Yesterday, 02:37 AM
Last Post: iji128at

Forum Jump:


 Users browsing this forum: 1 Guest(s)