Kavishka Gihan(@_kavigihan) 's Twitter Profile Photo

This is how 'Windows Installation Files' can be weaponized into that bypasses Defender in the latest Windows 11 distribution. development

account_circle
Kavishka Gihan(@_kavigihan) 's Twitter Profile Photo

'Self-deleting' that bypasses Defender in the latest Windows 11 update using 'Process Injection' to slip undetected, injecting shellcode into 'OneDrive.exe'. development

account_circle
V2(@ZeroMemoryEx) 's Twitter Profile Photo

trick to Bypass Defender AV
if you remove additional dependencies from Linker options,Defender and some other AVs will stop flagging your executable as malicious,i did some testing and i found out that the cause of that is kernel32.dll

trick to Bypass Defender AV
if you remove additional dependencies from Linker options,Defender and some other AVs will stop flagging your executable as malicious,i did some testing and i found out that the cause of that is kernel32.dll 
#CyberSecurity #MalwareDevelopment #infosec
account_circle
The Daily Share(@NguyenL65709731) 's Twitter Profile Photo

Many malware researchers reverse engineer malware without understanding why it is being reverse engineered. Only the how’s are known to them. This course was developed to address that knowledge gap.
Development Deve

liicourse.com/malware-develo…

Many malware researchers reverse engineer malware without understanding why it is being reverse engineered. Only the how’s are known to them. This course was developed to address that knowledge gap.
 #Development #Malware #MalwareDevelopment #MalwareDeve

liicourse.com/malware-develo…
account_circle
intel_guy(@intelguy007) 's Twitter Profile Photo

Skywalker recruiting for development. TA writes: 'As a member of , you will have access to the locker that our team uses, as well as TONS of evasive loaders and other tools that will aid you in your work.'
development

Skywalker recruiting for #ransomware development. TA writes: 'As a member of #TrapTight, you will have access to the locker that our team uses, as well as TONS of evasive loaders and other tools that will aid you in your work.'
#malware #malwaredevelopment #infosec #cybersecurity
account_circle
Noman Minhas(@malicious_dll) 's Twitter Profile Photo

A windows process eg, running Notepad, is not as simple as it seems. When working with , processes are something that I encounter every hour. Here is an in-depth working of a windows process and its structure.

urity

account_circle