You now have the option to keep the uploaded sample private to you in the #UnprotectProject cf: @darkcodersc #malware #infosec 👇

https://unprotect.it/scan/

Scan Sample - Unprotect Project

👽New technique added in the #UnprotectProject DB "EDR evasion technique using Syscall" by @ghost_pepper108. Take a look at the description and code snippet for further understanding.👇#infosec

https://unprotect.it/technique/evasion-using-direct-syscalls/

Evasion using direct Syscalls - Unprotect Project

New EDR/AV evasion technique added to the #UnprotectProject by @Praetorian_GRD "Unloading Module Using FreeLibrary". Check out the detailed description, code snippet and CAPA rule👇 #cybersecurity #malware #infosec

https://unprotect.it/technique/unloading-module-with-freelibrary/

Unloading Module with FreeLibrary - Unprotect Project

🧐Two new anti-debugging techniques have been added by Alex Schwarz including code snippets! Find out more on the #UnprotectProject pages! 👇 cf: @darkcodersc #infosec #malware

1⃣https://unprotect.it/technique/call-to-interrupt-procedure/

2⃣https://unprotect.it/technique/addvectoredexceptionhandler/

Call to Interrupt Procedure - Unprotect Project

📢Another section of the #UnprotectProject has been revamped – this time it's the Network Evasion section. If you're interested in learning more about Fast Flux, DGA or DNS tunnelling, be sure to check it out! 👇

#infosec #cybersecurity #malware #reverseengineering

https://unprotect.it/category/network-evasion/

Network Evasion - Unprotect Project

🤓I have released my slides from my recent presentation on the #UnprotectProject at @bsidessydney. If you're interested in learning more about this project, be sure to check them out! #cybersecurity #infosec #malware
https://speakerdeck.com/fr0gger/x-ray-of-malware-evasion-techniques-analysis-dissection-cure
X-Ray of Malware Evasion Techniques: Analysis, Dissection, Cure?

This presentation has been presented at Bsides Sydney (https://bsidessydney.org/) Malware evasion consists of techniques used by malware to bypass security in place, circumvent automated and static analysis as well as avoiding detection and harden reverse engineering. There is a broad specter of techniques that can be used. In this talk we will review the history of malware evasion techniques, understand the latest trends currently used by threat actors and bolster your security analysis skills by getting more knowledge about evasion mechanisms.

Speaker Deck

☠️Dirty Vanity is a process injection technique that exploits the Windows forking feature to inject code. This technique has been presented BlackHat EU by
@eliran_nissan and it is now available in the #UnprotectProject🤩 #infosec #malware

https://unprotect.it/technique/dirty-vanity/

Dirty Vanity - Unprotect Project

Happy to announce that I will be speaking next week at Bisdes Sydney about Malware Evasion Techniques and current trends! 🤩 #infosec #malware #UnprotectProject #ReverseEngineering @bsidessydney #bsides