Explore >> Select a destination


You are here

www.malwaretech.com
| | malwaretech.com
7.0 parsecs away

Travel
| | A lot of my articles have been aimed at giving a high-level insight into malware for beginners, or those unfamiliar with specific concepts. Today I've decided to start a new series designed to familiarize people with malware internals on a programming level. This will not be a tutorial aimed towards people creating sophisticated malware, but security enthusiasts looking to better understand it. ## Inline Hooking
| | werat.dev
15.5 parsecs away

Travel
| | Wine is a compatibility layer capable of running Windows applications on several POSIX-compliant operating systems, such as Linux, macOS, & BSD (https://www.winehq.org). If you have been using Linux for some time now, chances are you've used Wine at some point. Maybe to run that one very important Windows program that doesn't have a Linux version or maybe to play World of Warcraft or some other game. Fun fact, Valve's Steam Deck uses a Wine-based solution to run games (called Proton).
| | binarydebt.wordpress.com
10.3 parsecs away

Travel
| | System call table is an array of function pointers. It is defined in kernel space as variable sys_call_table and it contains pointers to functions which implement system calls. Index of each function pointer in the array is the system call number for that syscall. These are denoted by NR_* macros in header files, such as...
| | www.genians.co.kr
54.5 parsecs away

Travel
| APT37 used Dropbox to spread ZIP files with malicious LNK files that filelessly executed RoKRAT and triggered extra malware with the keyword 'toy'.