|
You are here |
blog.netlab.360.com | ||
| | | | |
0xcybery.github.io
|
|
| | | | | Inspiration of how we can use PDF as an attack vector and perform multiple attacks with huge subsequences to the victim. | |
| | | | |
intezer.com
|
|
| | | | | Symbiote is a new Linux® malware we discovered that acts in a parasitic nature, infecting other running processes to inflict damage on machines. | |
| | | | |
cocomelonc.github.io
|
|
| | | | | [AI summary] The provided text describes a C/C++ implementation of the Khufu encryption algorithm, used to encrypt and decrypt a payload for a potential malicious purpose. The code demonstrates how to use the algorithm to encrypt a shellcode payload, execute it via Windows APIs, and avoid detection by AV engines. Key points include the encryption process, the use of Windows API functions for execution, and the limited AV detection due to obfuscation and API calls rather than encryption. The text also mentions the resistance of Khufu to differential cryptanalysis but notes that a 16-round attack exists. The example is for educational purposes only. | |
| | | | |
bc-security.org
|
|
| | | |||