I have a passion for backdooring things . So this time after backdooring linux iso files i tried to backdoor windows ISO files . Adding backdoor to linux ISO file is fairly easy as the OS is open source but when it comes to windows its hard . The backdoor…


I found this bug a while ago . This bug requires initial access . Its great for post exploitation . Discord keeps a sqlite database called installer.db . The database has sha256 hashes of
every file that discord uses but it turns out that the integrity of some files are…


Malwares will sometimes run shellcode directly in memory . The common method to do that is first use VirtualAlloc to allocate memory with the right permissions . Then the malware will use RtlMoveMemory to write the shellcode to the allocated space . …


I am writing this blog with hopes that i will probably get hired by someone . I have been trying to get a job in IT but cant seem to impress . I have done enough projects which gave me enough confidence that i can make anything . I like…


Beacon frame : Here is the wikipedia defination . Beacon frame is one of the management frames in IEEE 802.11 based WLANs. It contains all the information about the network. …


I have been analysing maldocs for few days . I analysed two variants of emotet but i will write about only one variant . This will be a static analysis . First download the samples from here:https://github.com/jstrosch/malware-samples/blob/master/maldocs/emotet/2020/January/samples.zip

I dumped the macros using oledump .

The streams with M/m contains the…


Since you are here , i am going to assume that you know basic about syscalls and how to call them as well as how to assemble and link the assembly files . You may have a question . Why assembly ? Well there are two reasons . My life…


My friend who works as for a company . Lets call the company X . I cant post screenshots here as i was not allowed to take any . This incident happened 5–6 months ago so my memories are quite vague . He called me and asked how to handle…


I recently came across a powershell malware that used steganography and living of the land techniques . It was cool so i decided to make a similar poc with python . Lets clear the basics first . I will use a png image . A png image contains three compulsory…


Disclaimer : I am not an android developer and i hate java so i dont know much about the code . So if i make any mistake please correct me . Now lets get started

My friend received a message with a shortened link that points to a github website…

Debabrata

I am a hacker and ex-web developer . I sometime work as a freelance dev/hacker . Sometime I hunt bugs

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store