Skip to content
Black-Hat-Zig
Epilogue
Initializing search
CX330Blake/Black-Hat-Zig
Get Started
Basic Payload Management
Advanced Malware Techniques
Malware Examples
Epilogue
Black-Hat-Zig
CX330Blake/Black-Hat-Zig
Get Started
Get Started
Intro to Black-Hat-Zig
Before We Start
Basic Payload Management
Basic Payload Management
Intro
Payload Placement
Payload Placement
.data Section
.rdata Section
.text Section
.rsrc Section
Payload Obfuscation
Payload Obfuscation
IP Address Obfuscation
MAC Address Obfuscation
UUID Obfuscation
Payload Encryption
Payload Encryption
XOR Encryption
RC4 Encryption
AES Encryption
Payload Execution
Payload Execution
Execute Via DLL
Execute Via Shellcode
Advanced Malware Techniques
Advanced Malware Techniques
Intro
Process Enumeration
Process Enumeration
Using CreateToolhelp32Snapshot
Using EnumProcesses
Using NtQuerySystemInformation
Payload Staging
Payload Staging
Using Web Server
Using Windows Registry
Process Injection
Process Injection
APC Injection
APC Injection
Classic APC Injection
Early Bird APC Injection
Callback Code Execution
Callback Code Execution
Callback Code Execution
DLL Injection
DLL Injection
DLL Injection
Mapping Injection
Mapping Injection
Local Mapping Injection
Remote Mapping Injection
Shellcode Injection
Shellcode Injection
Shellcode Injection
Thread Hijacking
Thread Hijacking
Local Thread Creation
Local Thread Enumeration
Remote Thread Creation
Remote Thread Enumeration
Malware Examples
Malware Examples
Intro
Reverse Shell
Reverse Shell
Classic Reverse Shell
Reverse Shell With TLS
Epilogue
Epilogue
Thanks for reading this!
Give Black-Hat-Zig a star if you like it!
Back to top