Skip to content

Search

Recent Posts

  • GoGetC2 – Build Command and Control (Part 3)
  • GoGetC2 – Build Command and Control (Part 2)
  • GoGetC2 – Build Command and Control (Part 1)
  • Code Injection – DLL
  • SANS Index Builder

Categories

  • Linux
  • Malware
  • Red Team
  • Tools
  • Walkthrough
  • About
  • Blog
  • Contact
  • Home
  • Sample Page
The Adversarial Logbook
The Adversarial Logbook
Malware

Payload Encoding and Encryption

Payload Encoding and Encryption play significant...
C0deRedMay 29, 2023Jun 16, 2025
Malware

Droppers and Payloads

Droppers: A dropper is a type...
C0deRedMay 29, 2023Jun 16, 2025
Malware

Function Call Obfuscation

Function Call Obfuscation is a technique...
C0deRedMay 29, 2023Jun 16, 2025
Malware

Generating EXE vs DLL

In the context of Windows programming,...
C0deRedMay 28, 2023Jun 16, 2025
Malware

PE Format

Introduction to the PE Format: The...
C0deRedMay 28, 2023Jun 16, 2025
12