Mapping Malware APIs to Techniques
by xzin0vich - Friday July 19, 2024 at 12:19 PM
#11
Awesome let's see
Reply
#12
thank for sharing this. It very much sound interesting.
Reply
#13
Thank you for sharing with the community. Greatly appreciated
Reply
#14
thanks you bro ur a good
Reply
#15
very interesting, thank you so much for sharing
Reply
#16
yay API, I will check this ^_^
Reply
#17
(Jul 19, 2024, 12:19 PM)xzin0vich Wrote: This project can be used when developing malware or when analyzing the source code of one.

"Dissecting Malware API Calls as a Fingerprint"

Thank you very much for the share >
Reply
#18
Let's see these, I'm curious because I'm guessing it'll be Windows API to DLL's
Reply
#19
thanks for sharing, im gonna have a read
Reply
#20
wat is this ggftgfg
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Sektor7 - Malware Development Advanced - Vol.1 Sh4d0w1X 432 45,130 1 minute ago
Last Post: pddemerde
  Phishing Platform with 2FA bypass support Loki 141 22,394 14 minutes ago
Last Post: pddemerde
  Bypass Cookies Encryption | Working FrancisMDouble 9 1,190 1 hour ago
Last Post: Breacher_Lokidas
  Xordium stealer for Pulsar v2.4.5 nullvex 27 1,203 1 hour ago
Last Post: sc4rley_demo
  [Sektor7] Full Recent Course Spearr 34 1,094 2 hours ago
Last Post: OverclockX

Forum Jump:


 Users browsing this forum: 1 Guest(s)