As per request, I am adding a section to PE header by hand using a hex editor. http://resources.infosecinstitute.com/adding-a-section-to-pe-binary/ https://marcoramilli.blogspot.com/2010/12/windows-pe-header.html
How to add or modify or add PE Sections. Some things to read if you want. https://en.wikibooks.org/wiki/X86_Disassembly/Windows_Executable_Files#Section_Flags
This aims to be the first in a series of rootkit development. I hate theory so I will move on as soon as possible! Zayka's Gaming Twitch : Follow her for gam
Open Analysis Live teams up with MalwareAnalysisForHedgehogs to unpack Princess Locker ransomware. We show how to use x64dbg and hooks on VirtualAlloc to dump t
**Disclaimer all videos are made with permission on my own test network hacking into any device without consent is a crime we are not responsible for the misuse
Watch as I perform static malware analysis of this malware file with PE Studio/PE BEAR, and ID it to the malware type its associated with! Please Subscribe!!
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.html Follow us on Twitter for class news @OpenSecTraining. The playlist
Hello World of our Rootkit. JOIN OUR DISCORD!: https://discord.gg/wqKQcmK Zayka's gaming stream Join her army and help the bunnies! https://www.twitch.tv/zay
什麼是 PE ? Portable Executable 是一種在 Windows 上的檔案格式,常見的 exe、dll 等檔案都遵守這個檔案格式。在這 10 分鐘的議程裡,將會簡介 PE 的結構,並學以致用教大家寫出一個可以在任意 exe 檔中先跳出短短好可愛的對話框再執行原程式流程的小程式。真是太實用了呢! A
How are PE files mapped into memory? Follow me on Twitter: https://twitter.com/struppigel
I explain the basic structure of the Portable Executable file format using animated graphics. This video is meant for beginners in malware analysis. Follow me
UDEMY discount for Python Basics (Course 1 in the Python Penetration Testers series): http://bit.ly/2Gfx8Qh My courses Python for Penetration Testers: http://b
The class materials are available at http://www.OpenSecurityTraining.info/LifeOfBinaries.html Follow us on Twitter for class news @OpenSecTraining. The playlist
NoVA Hackers - 2013-03-11 Find the rest of the videos at http://ComputeCycle.com/
I'm gonna explain to you how to inject your own shell code manually into legitimate app such as putty.exe
Python with Unicorn Engine, Keystone, Capstone and pefile plugin. Deal with mapping section, applying iat, running x86 instructions via Unicorn Engine, and log.
Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK
* Please visit https://coolcamera.net * While you are there, please sign up for the newsletter. Thank you! If you like my videos, please support me on Patreon:
Please don't ask me where to find the CA files or passwords. They're out there. I'm using a method here developed from a conversation with David Manouchehri (