Kryptina Ransomware
Kryptina Ransomware-as-a-Service (RaaS) Kryptina is a Ransomware-as-a-Service (RaaS) that was identified in December 2024, designed to target Linux systems. The ransomware was observed in undergro...
Kryptina Ransomware-as-a-Service (RaaS) Kryptina is a Ransomware-as-a-Service (RaaS) that was identified in December 2024, designed to target Linux systems. The ransomware was observed in undergro...
Introduction As we have seen in the previous demo, we demonstrated thread hijacking within our local process. Here, we have created a suspended sacrificial thread that can execute a payload using i...
Windows Processes A Windows process is a program or application that is running on a Windows machine. A process can be started by either a user or by the system itself. The process consumes resourc...
Purpose Overview BabbleLoader is a loader-type Windows malware used to evade both traditional and AI-based detection systems. It uses junk code insertions and metamorphic transformations to chang...
Pegasus Timeline From July 2021, the Pegasus Project investigation was formed, which included seventeen news media organisations around the world such as The Guardian, Radio France, Le Monde, Die Z...
Saitama Agent On 26 April 2022, Malwarebytes identified a backdoor named Saitama. The backdoor was discovered after it was used in a targeted attack against the foreign ministry of Jordan. The too...
The Dirty Pipe exploit vulnerability lets us specify the file we want to overwrite, the offset we would like to overwrite it at, and the content we would like to insert. For my reference: https://...
SSH Tunneling Local Port Forwarding Local port forwarding allows you to forward a port from your local machine to a remote server. This is useful for accessing services on a remote network. ssh ...
These steps help in stabilising a shell by providing a more interactive environment, escaping restricted shells, and ensuring access to necessary binaries and terminal features. # Use Python to s...
Introduction When a user attempts to download a legtimate executable file from the internet, it is often signed by the company as a way of proving to the user that it is a trustworthy executable. ...