collection-placeholder.jpeg

Security-Oriented C

Article cover image
May 19, 2016

How is it goin', fellow 1337 haXX0rZ! dtm here with another article, this time, we'll be looking at infecting PE files, executables in particular for ...

Article cover image
May 5, 2016

Welcome back to a tutorial on malware. We'll be discovering a method to beef up our little trooper. Without further ado, let's jump right in!RecapIn t ...

Article cover image
May 5, 2016

Hello again, folks! I'm back with another (final) guide on runtime crypters which is an extension on my previous runtime crypter guide. If you have no ...

Article cover image
May 5, 2016

Yo yo yo, what's goin' on my devilish fiends? Have you come here to learn how to make a keylogger for malicious intent? You sly fox! But in all seriou ...

Article cover image
Mar 30, 2016

It's been a while since I wrote up an article for this series but I did say that I'd be covering some WinAPI. So if you're interested in programming f ...

Article cover image
Feb 4, 2016

Welcome to the final tutorial of the series on standard C. This article will cover the linked list abstract data type (ADT). There will be a lot of ab ...

Article cover image
Feb 3, 2016

Hello again, readers! In our previous crypter tutorial, we looked at how we could obfuscate our malware (or any program) by using a simple one-byte XO ...

Article cover image
Jan 27, 2016

How's it goin'? In this tutorial, we will learn about the security issues of the popen and system functions. I've seen a few people attempting to run ...

Article cover image
Jan 24, 2016

Welcome to a tutorial on crypting technology. In this article, we will be discussing types of crypters, how they work and why they work. After definin ...

Article cover image
Jan 23, 2016

Welcome to a tutorial on XOR encryption. We'll be looking at what XOR is and how we can use it to encrypt or decrypt data.What Is XOR?XOR is a bitwise ...