██████╗ ██╗      █████╗  ██████╗██╗  ██╗██╗  ██╗ █████╗ ████████╗ ██████╗ ██████╗ ██████╗ ███████╗
██╔══██╗██║     ██╔══██╗██╔════╝██║ ██╔╝██║  ██║██╔══██╗╚══██╔══╝██╔════╝██╔═══██╗██╔══██╗██╔════╝
██████╔╝██║     ███████║██║     █████╔╝ ███████║███████║   ██║   ██║     ██║   ██║██║  ██║█████╗  
██╔══██╗██║     ██╔══██║██║     ██╔═██╗ ██╔══██║██╔══██║   ██║   ██║     ██║   ██║██║  ██║██╔══╝  
██████╔╝███████╗██║  ██║╚██████╗██║  ██╗██║  ██║██║  ██║   ██║   ╚██████╗╚██████╔╝██████╔╝███████╗
╚═════╝ ╚══════╝╚═╝  ╚═╝ ╚═════╝╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═╝   ╚═╝    ╚═════╝ ╚═════╝ ╚═════╝ ╚══════╝
home | archive | code | zines | papers | threat collection | apt collection | samples | supporters | contact
 ______     ______     ______     __  __     __     __   __   ______    
/\  __ \   /\  == \   /\  ___\   /\ \_\ \   /\ \   /\ \ / /  /\  ___\   
\ \  __ \  \ \  __<   \ \ \____  \ \  __ \  \ \ \  \ \ \'/   \ \  __\   
 \ \_\ \_\  \ \_\ \_\  \ \_____\  \ \_\ \_\  \ \_\  \ \__|    \ \_____\ 
  \/_/\/_/   \/_/ /_/   \/_____/   \/_/\/_/   \/_/   \/_/      \/_____/ 
                                                                        
z0mbie/29a 21 Ways To Reset A Register
Hooking WinNT/2K/XP API
Code Transformation and Finite Automatons
Automated Reverse Engineering: Mistfall Engine
Disassemblers Within Viruses
DELAYED CODE
VIRUS ENGINES: COMMON RECOMMENDATIONS
Executable Trash Generator (ETG Engine)
HOW TO CREATE YOUR OWN RSA KEY
I.Danilov vs V.Bogdanov (Dr.Web vs AVP): Programmer's Competition [EN]
Injected Evil: (executable files infection) [TEXT FORMAT]
KME-32: Kewl Mutation Engine User's Manual [EN]
LDE32: Length-Disassembler Engine User's Manual [EN]
ADDING LDT ENTRIES IN WIN2K
libtcc can be useful to use tcc as a "backend" for a code generator
SOME IDEAS ABOUT METAMORPHISM
METAMORPHISM AND PERMUTATION: FEEL THE DIFFERENCE
Description of the Win9X INT 2E services (VMM/NTKERN.VxD) [EN]
Opcode Frequency Statistics
TRAITOR OUTLOOK
WRITING INTO KERNEL FROM RING-3: LETS FUCK PAGETABLE [EN]
Permutation conditions
Polymorphic Games
PRCG: Polymorphic Recursive Cycle Generator
PERVERT WORLD WIDE
ABOUT REVERSING
LIMITING DATA TRANSFER SPEED
TCP switch
TRACING UNDER WIN32
ABOUT UNDETECTABLE VIRUSES
DATA ENCODING IN META VIRUSES
VMware has you
H2HC Anti-Forensics by Domingo Montanaro
Process Infection by Carlos Barros
Detecting BluePill by Edgar Barbosa
PE Binary Infection by Maycon Vitali
Malwares VS Antivírus by Wendel Guglielmetti Henrique
Kernel-Land Rootkits by "Strauss" + Code
PCI Rootkits by Bruno Cardoso Lopes and João Batista Correa
Ring x64
Realidade das BotNets Atuais by Ranieri Romera
Detecting Obfuscated Malicious JavaScript with Snort and Razorback by Alex Kirk
I Know Kung-Fu! Analyzing Mobile Malware by Alex Kirk
Linux Kernel Rootkits by Ilya V. Matveychikov and Ighor Augusto
Construindo Bootkits: Ideias para GRUB2 com Linux
UEFI Firmware Rootkits: Myths and Reality by Alex Matrosov and Eugene Rodionov
kernelmode
Site Archive kernelmode.info
Complete KernelMode.info Download KernelMode.info Download
The Outlaws Disk archive
CD 1 Outlaws Disk Volume 1
CD 2 Outlaws Disk Volume 2
Full Download Outlaws Disk Full Download
Azeria-Labs archive
Site Archive Azeria-Labs - Introduction to ARM assembly
Complete Azeria-Labs Download Azeria-Labs Download
Phrack (Full Archive)
Complete Phrack Download (zipped tar) Phrack Download
Cypherpunk Mailing List Archive (Full Archive)
1992 to Present Archive as eml Cypherpunk 1992 - Present Download
August 1992 to March 1993 Archive as txt Cypherpunk 1992-08 to 1993-03 Download
April 1993 to June 1999 Archive as txt Cypherpunk 1993-04 to 1999-06 Download
DEF CON (26, 27 & 28)
DEF CON 26 DEF CON 26 Download
DEF CON 27 DEF CON 27 Download
DEF CON 28 Safe Mode DEF CON 28 Download
The 2600 magazine Archive
1984-2020 Archive as PDF 2600 Magazine 1984-2020 Download
Cult of The Dead Cow Text archive
Complete cDc Text Archive Cult of The Dead Cow Complete Text Archive Download
The Jolly Roger's Cookbook (AKA: "The Anarchist Cookbook")
Complete Collection The Jolly Rogers Cookbook Download
Electronic Frontier Foundation Archive
EFF Newsletters, Legal Cases & EFF Website Electronic Frontier Foundation Archive Download
Jargon File Archive
Jargon File Archive Jargon File Archive Download
Bruce Schneier's "Cryptogram Newsletter" Archive
Archive (1998-2020) Bruce Schneier's Cryptogram Newsletter Archive Download
Sabu (IRCStorm) Snitch Archive
Archive (Compiled by VX-Underground) Sabu Snitch Archive Download
Hacker Text archive (VX-Underground User Submissions)
Complete archive of user submitted texts and e-zines Text Archive Download
Ransomware Live Blog and Extortion Sites (Updated) AVOS: http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion/ AVADDON: http://avaddongun7rngel.onion/ BABUK: http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvihfyd.onion/ CLOPS: http://ekbgzchl6x2ias37.onion/ CONTI: http://htcltkjqoitnez5slo7fvhiou5lbno5bwczu7il2hmfpkowwdpj3q2yd.onion/ CONTI-NEWS (RYUK): http://fylszpcqfel7joif.onion/ DARKSIDE: http://darksidedxcftmqa.onion/ DOPPLE PAYMER: http://hpoo4dosa3x4ognfxpqcrjwnsigvslm7kv6hvmhh2yqczaxy3j6qnwad.onion/ MAZE: http://xfr3txoorcyy7tikjgj5dk3rvo3vsrpyaxnclyohkbfp3h277ap4tiad.onion/ MAZE-NEWS: https://mazenews.online NEFILIM: http://hxt254aygrsziejn.onion/ PYSA: http://wqmfzni2nvbbpk25.onion/partners.html RAGNAR: http://p6o7m73ujalhgkiv.onion/ SEKHMET: http://sekhmetleaks.top/ SUNCRYPT: http://nbzzb6sa6xuura2z.onion/ PROLOCK: http://msaoyrayohnp32tcgwcanhjouetb5k54aekgnwg7dcvtgtecpumrxpqd.onion MOUNT LOCKER: http://mountnewsokhwilx.onion/ EGREGOR: http://egregoranrmzapcv.onion LOCKBIT: http://lockbit-blog.com/
January 28th, 2020: Operation Reddawn e-mail correspondence E-mail chain (PDF)
Mal4ALL Forum Archive/Source Mal4ALL Forum Archive/Source Zip
Hacking.pl Data Archives (PL) HACK FAQ sAmkO[FAQ] version 1.BETA Witaj na serwerze CyBeR FinGeR
USA Government UFO Black Vault Release Black Vault PDF files
Bugtraq Archive Bugtraq Archive download
Jim Browning: Spying on the Scammers Youtube: Jim Browning Youtube Twitter: Official Twitter account Spying on the Scammer series: YouTube playlist Download (mirror): Spying on the Scammers complete series
`. `odms- `odmmmmmy- `ymmmmmmmmh. hmmmmmmd` ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd -yo-..............hmmmmmmd...............+y: -ymmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh: `smmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh. `+dmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh: `omdysyyyyssssyyyyydmmmmmmmyyyyyyyyyyyyssydmh/ .` hmmmmmmm - hmmmmmmm `- hmmmmmmm -` `+dmdssssssssssssssssssssssssdmmmmmmmsssssssssssssssssssssssshmdo` `+dmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmdo` `odmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmms. .smmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmms. .o:........................hmmmmmmm-.......................:o- hmmmmmmm` hmmmmmmm` ````` hmmmmmmm` ````` -/oyhmmmmmmmdhs+:` hmmmmmmm` `:+sydmmmmmmmdhs+:` `:sdmmmmmmmmmmmmmmmmmmho- hmmmmmmm` .+ymmmmmmmmmmmmmmmmmmmy/` `+dmmmmmmmmmmmmmmmmmmmmmmmmh+.hmmmmmmm./hmmmmmmmmmmmmmmmmmmmmmmmmdo` :dmmmmmmmmmmmddhhdmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmddhddmmmmmmmmmmmd/ /mmmmmmmmmh+-` `.:ohmmmmmmmmmmmmmmmmmmmmmmmmho/.` `-+ymmmmmmmmmo :mmmmmmmmh: .+dmmmmmmmmmmmmmmmmmmd+. -ymmmmmmmm/ hmmmmmmmy` :ymmmmmmmmmmmmmmh/ ommmmmmmd` .mmmmmmmd` -smmmmmmmmmmh: hmmmmmmm: -mmmmmmmy -dmmmmmmmmm/ ommmmmmm/ `mmmmmmmd `smmmmmmmmmmmmy. ymmmmmmm- smmmmmmms `+dmmmmmmmmmmmmmmmo` +mmmmmmmh `dmmmmmmmh: -odmmmmmmmmmdmmmmmmmmms- -ymmmmmmmd. .dmmmmmmmmds/-.` `-/sdmmmmmmmmmmy.`smmmmmmmmmmds/-.` `.-/ohmmmmmmmmd- `ymmmmmmmmmmmmmmmmmmmmmmmmmmmmmd/ -hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmy. :ymmmmmmmmmmmmmmmmmmmmmmmmmd+` /dmmmmmmmmmmmmmmmmmmmmmmmmmh: -ohmmmmmmmmmmmmmmmmmmmds: :sdmmmmmmmmmmmmmmmmmmmds- ./oydmmmmmmmmmdhs+- -/shdmmmmmmmmmdyo/. `..----.` `..---..`