Tags » Rootkit

AV Evasion Using Alpha_Mixed Encoder

To enhance even more AVET I had a look at the alpha_mixed encoder from the metasploit project. An ASCII only shellcode can be produced that way: 253 more words


Insider who scammed $14.3m lottery 'win' pleads guilty

Eddie Raymond Tipton, the former Hot Lotto security director who was convicted of running a malware-generating luck factory to scam his own lottery for $14.3m, is looking at up to 25 years in jail. 819 more words


ipfilterX Codename Logical

>Date 02/06/2017


-Blocked Threats:
-Updated Threats: [2]
-IP Added Record:


>Parsed lines/entries:23K Found IP ranges:23K Duplicate:0 Merged:0 Time:0 secs

>IP Count: 550M… 87 more words

Making a Rootkit

#include <asm/unistd.h>

#include <asm/cacheflush.h>

#include <linux/init.h>

#include <linux/module.h>

#include <linux/kernel.h>

#include <linux/syscalls.h>

#include <asm/pgtable_types.h>

#include <linux/highmem.h>

#include <linux/fs.h>

#include <linux/sched.h>

#include <linux/moduleparam.h>

#include <linux/unistd.h>

#include <asm/cacheflush.h> 297 more words


How to be a tech security Jedi: 5 lessons from the original Star Wars movies

Pop-culture can teach us a lot about computer security if we’re willing to dig a bit beneath the surface.

1. R2-D2 hides important data in plain sight… 699 more words

Rootkit - Levitate (feat. Tylor Maurer)

Digital Crate Digging Continues per Music Monday!!  clear the runway, we’re coming through!

Digital? analog? let the music play!! we’re not done, no way!! we’re letting the peeps know what it do!! 102 more words

Breakbeat Science

System architecture and the role of antivirus software in different platforms

Antivirus software is essential to safeguarding the computing needs of every person from the perspective of keeping browsing activities on the Internet safe from privy eyes, to the prevention of hacking of personal files such as photos, documents and drawings. 1,978 more words

Computer Security