Mapping Malware APIs to Techniques
by xzin0vich - Friday July 19, 2024 at 12:19 PM
#11
Awesome let's see
Reply
#12
thank for sharing this. It very much sound interesting.
Reply
#13
Thank you for sharing with the community. Greatly appreciated
Reply
#14
thanks you bro ur a good
Reply
#15
very interesting, thank you so much for sharing
Reply
#16
yay API, I will check this ^_^
Reply
#17
(Jul 19, 2024, 12:19 PM)xzin0vich Wrote: This project can be used when developing malware or when analyzing the source code of one.

"Dissecting Malware API Calls as a Fingerprint"

Thank you very much for the share >
Reply
#18
Let's see these, I'm curious because I'm guessing it'll be Windows API to DLL's
Reply
#19
thanks for sharing, im gonna have a read
Reply
#20
wat is this ggftgfg
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  [ LIST ] 5 FREE STEALERS WITH PROS/CONS elix 398 16,414 2 hours ago
Last Post: obito07
  [Sektor7] Full Recent Course Spearr 36 1,258 3 hours ago
Last Post: Netr0
  PowerShell AMSI Bypass via VEH Loki 43 4,236 4 hours ago
Last Post: NUKEx
  Xordium stealer for Pulsar v2.4.5 nullvex 30 1,377 4 hours ago
Last Post: NUKEx
  Bypass Cookies Encryption | Working FrancisMDouble 10 1,298 Yesterday, 05:28 PM
Last Post: zxACASD

Forum Jump:


 Users browsing this forum: 1 Guest(s)