sargx digital garden

Home

❯

Computer $h1t

❯

Red Team

❯

Malware

Malware

Feb 17, 20261 min read


Windows Malware Development

Linux Malware Development


Study Cases

Obfuscators

Integrity Checks

Dev


Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

https://github.com/LordNoteworthy/al-khaser

MALWARE REPOS:

https://vx-underground.org/

https://vxug.fakedoma.in/papers/VXUG/Mirrors/RootkitTech/CheckKernelEATHook/CheckKernelHook/CheckKernelHook/

https://git.tcp.direct/


BLOGS:

https://krabsonsecurity.com/


CONTENT:

https://blog.vincss.net/2021/01/re019-from-a-to-x-analyzing-some-real-cases-which-used-recent-Emotet-samples.html

https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/

http://www.staroceans.org/e-book/bitlackeys/index.html#research


🌱 Back to Garden

6 items under this folder.

  • Feb 17, 2026

    Obfuscators

    • Feb 17, 2026

      Windows Malware Development

      • Feb 17, 2026

        Linux Malware Development

        • Feb 17, 2026

          Study Cases

          • Feb 17, 2026

            Integrity Checks

            • Feb 17, 2026

              Dev


              Created with Quartz v4.5.2 © 2026

              • GitHub
              • Discord Community