v x

Invisible Text. Fuck you.

Home Code Archive ICS SCADA Papers Linux Papers Malware Defense Papers Other Papers Russian Papers Windows Papers Malware Collections

MacOS VX

Advanced Mac OS X Rootkits
Beyond the good ol LaunchAgents - 001 - shell startup files
Beyond the good ol LaunchAgents - 002 - iTerm2 startup
Beyond the good ol LaunchAgents - 003 - Login Items
Beyond the good ol LaunchAgents - 004 - cron jobs
Beyond the good ol LaunchAgents - 005 - Pluggable Authentication Modules PAM
Beyond the good ol LaunchAgents - 006 - SSHRC
Beyond the good ol LaunchAgents - 007 - xbar plugins
Beyond the good ol LaunchAgents - 008 - Hammerspoon
Beyond the good ol LaunchAgents - 009 - Preference Pane
Beyond the good ol LaunchAgents - 010 - Application script files
Beyond the good ol LaunchAgents - 011 - Spotlight Importers
Beyond the good ol LaunchAgents - 012 - QuickLook Plugins
Beyond the good ol LaunchAgents - 013 - Audio Plugins
Beyond the good ol LaunchAgents - 014 - atrun
Beyond the good ol LaunchAgents - 015 - xsanctl
Beyond the good ol LaunchAgents - 016 - Screen Saver
Beyond the good ol LaunchAgents - 017 - Color Pickers
Beyond the good ol LaunchAgents - 018 - X11 and XQuartz
Beyond the good ol LaunchAgents - 019 - Periodic Scripts
Beyond the good ol LaunchAgents - 020 - Terminal Preferences
Beyond the good ol LaunchAgents - 021 - Re-opened Applications
Beyond the good ol LaunchAgents - 022 - LoginHook and LogoutHook
Beyond the good ol LaunchAgents - 023 - emond The Event Monitor Daemon
Beyond the good ol LaunchAgents - 024 - Folder Actions
Beyond the good ol LaunchAgents - 025 - Apache2 modules
Beyond the good ol LaunchAgents - 026 - Finder Sync Plugins
Beyond the good ol LaunchAgents - 027 - Dock shortcuts
Beyond the good ol LaunchAgents - 028 - Authorization Plugins
Beyond the good ol LaunchAgents - 029 - amstoold
Code injection on macOS
Leveraging Emond on macOS For Persistence
Methods of Malware Persistence on Mac OS X
Revisiting Mac OS X Kernel Rootkits

Malware Mutation Engines

A Discussion Of Methodology And Implementation BuzFS
A Discussion of Polymorphism
A Humble Polymorphic Engine Primer Absolute OverlordVLAD
A Phreaky Macro Primer 01
A idiot guide to writing polymorphic engines
Advanced Polymorphism Primer
An Introduction to (Metamorphic) Encryption Part I
An Introduction to (Metamorphic) Encryption Part II
An Introduction to (Metamorphic) Encryption Part III
Argument for slow infection and slow polymorphism
Computer Viruses, Artificial Life and Evolution
Data Encoding in Meta Viruses
Do Polymorphism
Generic Polymorphism
Glitchs Polymorphic Batch
Guide to improving Polymorphic Engines
Introductory Primer To Polymorphism in Theory and Practice
Metamorphic Code
Metamorphism and permutation - Feel the difference
Metamorphism essay an abstraction
Metaviruses
Methods Behind A Polymorph Engine Black Baron
Mocoh Polymorphic Engine
Other techniques of polymorphism
Polymorphic Generators
Polymorphic Viruses Implementation Detection and Protection
Polymorphism - Analysis on the Decryptor Generator
Polymorphism By The Executioner
Polymorphism Level 6B Polymorphism Chaotic Permutations
Polymorphism Tutorial Part II v10
Polymorphism and Grammars
Primer in Polymorphic for OF97 VX
Recompiling the metamorphism
Resource Based Polymorphism rbp
Some ideas on Metamorphism
The Complete Re-write Engine
The Evolution of Polymorphic Viruses
The Giant Black Book of Computer Viruses
The Little Black Book of Computer Viruses - CD
The Little Black Book of Computer Viruses
The bliem polymorphic engine for VBA
Theme Metamorphism
Understanding and Managing Polymorphic Viruses
Understanding encryption and polymorphism
Viral polymorphism
Win32 Polymorphism

Sponsor

sponsor Tutorial from zetalytics.com

Want to sponsor vx-underground?

Your information could go here