Skip to content

References

New References

  • The Road To Reverse Engineering Malware: https://www.secjuice.com/the-road-to-reverse-engineering-malware/
  • Unpacking the packed unpacker: https://www.virusbulletin.com/blog/2019/01/vb2018-paper-unpacking-packed-unpacker-reversing-android-anti-analysis-library/
  • ELF in-memory execution: https://blog.fbkcs.ru/en/elf-in-memory-execution/
  • Botnet Takeover (NSA Docs): https://twitter.com/0xffff0800/status/1077052289175609344
  • An example rootkit that gives a userland process root permissions: https://github.com/PinkP4nther/Sutekh

Browser-C2

  • https://pentestlab.blog/2018/06/06/command-and-control-browser/
  • https://github.com/0x09AL/Browser-C2