██████╗ ██╗ █████╗ ██████╗██╗ ██╗██╗ ██╗ █████╗ ████████╗ ██████╗ ██████╗ ██████╗ ███████╗ ██╔══██╗██║ ██╔══██╗██╔════╝██║ ██╔╝██║ ██║██╔══██╗╚══██╔══╝██╔════╝██╔═══██╗██╔══██╗██╔════╝ ██████╔╝██║ ███████║██║ █████╔╝ ███████║███████║ ██║ ██║ ██║ ██║██║ ██║█████╗ ██╔══██╗██║ ██╔══██║██║ ██╔═██╗ ██╔══██║██╔══██║ ██║ ██║ ██║ ██║██║ ██║██╔══╝ ██████╔╝███████╗██║ ██║╚██████╗██║ ██╗██║ ██║██║ ██║ ██║ ╚██████╗╚██████╔╝██████╔╝███████╗ ╚═════╝ ╚══════╝╚═╝ ╚═╝ ╚═════╝╚═╝ ╚═╝╚═╝ ╚═╝╚═╝ ╚═╝ ╚═╝ ╚═════╝ ╚═════╝ ╚═════╝ ╚══════╝
______ ______ ______ __ __ __ __ __ ______
/\ __ \ /\ == \ /\ ___\ /\ \_\ \ /\ \ /\ \ / / /\ ___\
\ \ __ \ \ \ __< \ \ \____ \ \ __ \ \ \ \ \ \ \'/ \ \ __\
\ \_\ \_\ \ \_\ \_\ \ \_____\ \ \_\ \_\ \ \_\ \ \__| \ \_____\
\/_/\/_/ \/_/ /_/ \/_____/ \/_/\/_/ \/_/ \/_/ \/_____/
z0mbie/29a
21 Ways To Reset A Register
Hooking WinNT/2K/XP API
Code Transformation and Finite Automatons
Automated Reverse Engineering: Mistfall Engine
Disassemblers Within Viruses
DELAYED CODE
VIRUS ENGINES: COMMON RECOMMENDATIONS
Executable Trash Generator (ETG Engine)
HOW TO CREATE YOUR OWN RSA KEY
I.Danilov vs V.Bogdanov (Dr.Web vs AVP): Programmer's Competition [EN]
Injected Evil: (executable files infection) [TEXT FORMAT]
KME-32: Kewl Mutation Engine User's Manual [EN]
LDE32: Length-Disassembler Engine User's Manual [EN]
ADDING LDT ENTRIES IN WIN2K
libtcc can be useful to use tcc as a "backend" for a code generator
SOME IDEAS ABOUT METAMORPHISM
METAMORPHISM AND PERMUTATION: FEEL THE DIFFERENCE
Description of the Win9X INT 2E services (VMM/NTKERN.VxD) [EN]
Opcode Frequency Statistics
TRAITOR OUTLOOK
WRITING INTO KERNEL FROM RING-3: LETS FUCK PAGETABLE [EN]
Permutation conditions
Polymorphic Games
PRCG: Polymorphic Recursive Cycle Generator
PERVERT WORLD WIDE
ABOUT REVERSING
LIMITING DATA TRANSFER SPEED
TCP switch
TRACING UNDER WIN32
ABOUT UNDETECTABLE VIRUSES
DATA ENCODING IN META VIRUSES
VMware has you
H2HC
Anti-Forensics by Domingo Montanaro
Process Infection by Carlos Barros
Detecting BluePill by Edgar Barbosa
PE Binary Infection by Maycon Vitali
Malwares VS Antivírus by Wendel Guglielmetti Henrique
Kernel-Land Rootkits by "Strauss" + Code
PCI Rootkits by Bruno Cardoso Lopes and João Batista Correa
Ring x64
Realidade das BotNets Atuais by Ranieri Romera
Detecting Obfuscated Malicious JavaScript with Snort and Razorback by Alex Kirk
I Know Kung-Fu! Analyzing Mobile Malware by Alex Kirk
Linux Kernel Rootkits by Ilya V. Matveychikov and Ighor Augusto
Construindo Bootkits: Ideias para GRUB2 com Linux
UEFI Firmware Rootkits: Myths and Reality by Alex Matrosov and Eugene Rodionov
The Outlaws Disk archive
Full Download
Outlaws Disk Full DownloadAzeria-Labs archive
Site Archive
Azeria-Labs - Introduction to ARM assemblyComplete Azeria-Labs Download
Azeria-Labs DownloadPhrack (Full Archive)
Complete Phrack Download (zipped tar)
Phrack DownloadCypherpunk Mailing List Archive (Full Archive)
1992 to Present Archive as eml
Cypherpunk 1992 - Present DownloadAugust 1992 to March 1993 Archive as txt
Cypherpunk 1992-08 to 1993-03 DownloadApril 1993 to June 1999 Archive as txt
Cypherpunk 1993-04 to 1999-06 DownloadDEF CON (26, 27 & 28)
DEF CON 26
DEF CON 26 DownloadDEF CON 27
DEF CON 27 DownloadDEF CON 28 Safe Mode
DEF CON 28 DownloadThe 2600 magazine Archive
1984-2020 Archive as PDF
2600 Magazine 1984-2020 DownloadCult of The Dead Cow Text archive
Complete cDc Text Archive
Cult of The Dead Cow Complete Text Archive DownloadThe Jolly Roger's Cookbook (AKA: "The Anarchist Cookbook")
Complete Collection
The Jolly Rogers Cookbook DownloadElectronic Frontier Foundation Archive
EFF Newsletters, Legal Cases & EFF Website
Electronic Frontier Foundation Archive DownloadJargon File Archive
Jargon File Archive
Jargon File Archive DownloadBruce Schneier's "Cryptogram Newsletter" Archive
Archive (1998-2020)
Bruce Schneier's Cryptogram Newsletter Archive DownloadSabu (IRCStorm) Snitch Archive
Archive (Compiled by VX-Underground)
Sabu Snitch Archive DownloadHacker Text archive (VX-Underground User Submissions)
Complete archive of user submitted texts and e-zines
Text Archive DownloadRansomware Live Blog and Extortion Sites (Updated)
AVOS: http://avosqxh72b5ia23dl5fgwcpndkctuzqvh2iefk5imp3pi5gfhel5klad.onion/ AVADDON: http://avaddongun7rngel.onion/ BABUK: http://wavbeudogz6byhnardd2lkp2jafims3j7tj6k6qnywchn2csngvihfyd.onion/ CLOPS: http://ekbgzchl6x2ias37.onion/ CONTI: http://htcltkjqoitnez5slo7fvhiou5lbno5bwczu7il2hmfpkowwdpj3q2yd.onion/ CONTI-NEWS (RYUK): http://fylszpcqfel7joif.onion/ DARKSIDE: http://darksidedxcftmqa.onion/ DOPPLE PAYMER: http://hpoo4dosa3x4ognfxpqcrjwnsigvslm7kv6hvmhh2yqczaxy3j6qnwad.onion/ MAZE: http://xfr3txoorcyy7tikjgj5dk3rvo3vsrpyaxnclyohkbfp3h277ap4tiad.onion/ MAZE-NEWS: https://mazenews.online NEFILIM: http://hxt254aygrsziejn.onion/ PYSA: http://wqmfzni2nvbbpk25.onion/partners.html RAGNAR: http://p6o7m73ujalhgkiv.onion/ SEKHMET: http://sekhmetleaks.top/ SUNCRYPT: http://nbzzb6sa6xuura2z.onion/ PROLOCK: http://msaoyrayohnp32tcgwcanhjouetb5k54aekgnwg7dcvtgtecpumrxpqd.onion MOUNT LOCKER: http://mountnewsokhwilx.onion/ EGREGOR: http://egregoranrmzapcv.onion LOCKBIT: http://lockbit-blog.com/January 28th, 2020: Operation Reddawn e-mail correspondence
E-mail chain (PDF)Mal4ALL Forum Archive/Source
Mal4ALL Forum Archive/Source ZipUSA Government UFO Black Vault Release
Black Vault PDF filesJim Browning: Spying on the Scammers
Youtube: Jim Browning Youtube Twitter: Official Twitter account Spying on the Scammer series: YouTube playlist Download (mirror): Spying on the Scammers complete series`. `odms- `odmmmmmy- `ymmmmmmmmh. hmmmmmmd` ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd ymmmmmmd -yo-..............hmmmmmmd...............+y: -ymmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh: `smmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh. `+dmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmh: `omdysyyyyssssyyyyydmmmmmmmyyyyyyyyyyyyssydmh/ .` hmmmmmmm - hmmmmmmm `- hmmmmmmm -` `+dmdssssssssssssssssssssssssdmmmmmmmsssssssssssssssssssssssshmdo` `+dmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmdo` `odmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmms. .smmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmms. .o:........................hmmmmmmm-.......................:o- hmmmmmmm` hmmmmmmm` ````` hmmmmmmm` ````` -/oyhmmmmmmmdhs+:` hmmmmmmm` `:+sydmmmmmmmdhs+:` `:sdmmmmmmmmmmmmmmmmmmho- hmmmmmmm` .+ymmmmmmmmmmmmmmmmmmmy/` `+dmmmmmmmmmmmmmmmmmmmmmmmmh+.hmmmmmmm./hmmmmmmmmmmmmmmmmmmmmmmmmdo` :dmmmmmmmmmmmddhhdmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmddhddmmmmmmmmmmmd/ /mmmmmmmmmh+-` `.:ohmmmmmmmmmmmmmmmmmmmmmmmmho/.` `-+ymmmmmmmmmo :mmmmmmmmh: .+dmmmmmmmmmmmmmmmmmmd+. -ymmmmmmmm/ hmmmmmmmy` :ymmmmmmmmmmmmmmh/ ommmmmmmd` .mmmmmmmd` -smmmmmmmmmmh: hmmmmmmm: -mmmmmmmy -dmmmmmmmmm/ ommmmmmm/ `mmmmmmmd `smmmmmmmmmmmmy. ymmmmmmm- smmmmmmms `+dmmmmmmmmmmmmmmmo` +mmmmmmmh `dmmmmmmmh: -odmmmmmmmmmdmmmmmmmmms- -ymmmmmmmd. .dmmmmmmmmds/-.` `-/sdmmmmmmmmmmy.`smmmmmmmmmmds/-.` `.-/ohmmmmmmmmd- `ymmmmmmmmmmmmmmmmmmmmmmmmmmmmmd/ -hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmy. :ymmmmmmmmmmmmmmmmmmmmmmmmmd+` /dmmmmmmmmmmmmmmmmmmmmmmmmmh: -ohmmmmmmmmmmmmmmmmmmmds: :sdmmmmmmmmmmmmmmmmmmmds- ./oydmmmmmmmmmdhs+- -/shdmmmmmmmmmdyo/. `..----.` `..---..`