Mapping Malware APIs to Techniques
by xzin0vich - Friday July 19, 2024 at 12:19 PM
#21
thanks for sharing!
Reply
#22
(Jul 19, 2024, 12:19 PM)xzin0vich Wrote: This project can be used when developing malware or when analyzing the source code of one.

"Dissecting Malware API Calls as a Fingerprint"

Thank you for sharing.
Reply
#23
Thanks man I have been searching for something like this
Reply
#24
thank you so much <>___<>
Reply
#25
Thanks for this share.
Reply
#26
thank you very much bro
Reply
#27
thank you brother, i really need this
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [Sektor7] Full Recent Course Spearr 39 1,460 3 hours ago
Last Post: avark68
  Rust Based Windows Kernel Rootkit Loki 130 9,488 5 hours ago
Last Post: lukaku
  Xordium stealer for Pulsar v2.4.5 nullvex 32 1,592 6 hours ago
Last Post: lukaku
  3 sektor7 free courses NEO123 51 3,733 Yesterday, 07:07 PM
Last Post: AKASHIC
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 435 46,612 Yesterday, 07:03 PM
Last Post: AKASHIC

Forum Jump:


 Users browsing this forum: 1 Guest(s)