Search results for query: *

  • Users: Sendjunks
  • Content: Threads
  • Order by date

Forum search Google search

  1. Sendjunks

    Linux Process Injection

    I wrote this originally for my website, but I’ve removed some of the philosophical points I was making on my site. If you’re interested in that, please check out https://16-bitwisdom.com/ 48. Ptrace is a system call in the Linux operating system that allows a process to trace another process...
  2. Sendjunks

    Need advice on unpacking .dll

    How To Unpack VMProtect 3 (x64) Night Sky Ransomware With VMPDump [Patreon Unlocked]
  3. Sendjunks

    Keylogger :- A Basic Malware

    INTRODUCTION Keyloggers are tools that record what a person types on a device. While there are legitimate and legal uses for keyloggers, many uses for keyloggers are malicious. In a keylogger attack, the keylogger software records every keystroke on the victim’s device and sends it to the...
  4. Sendjunks

    Writing a simple, Stealthy malware

    Introduction This article will discuss and demonstrate how polymorphic malware use self-modification to hide its inner workings, In my previous post metamorphic malware, I explained how to write a malware with metamorphism features. So what is it, Well, Polymorphic malware is an old idea...
  5. Sendjunks

    nginx-ultimate-bad-bot-blocker

    Nginx Bad Bot and User-Agent Blocker, Spam Referrer Blocker, Anti DDOS, Bad IP Blocker and Wordpress Theme Detector Blocker nginx-ultimate-bad-bot-blocker
  6. Sendjunks

    Anti-Debug with conditional reverse-shell

    If you are reading this, this program is basic anti-debug in rustlang, it is able to detect whether or not it is being debugged. If the program is detected an active tracer then it won’t execute it’s payload…If no then it will send the reverse shell. use nix::sys::ptrace::traceme; use...
  7. Sendjunks

    Polymorphic code in Assembly - A Guide for (potential) Assembly enjoyers

    1.Introducing polymorphic code NOTE: This article will mainly focus on 80x86 architecture. Note: Reading time - 30 minutes +; If you follow along, even more. Polymorphism is, in my opinion, very hard to explain well in just one little tutorial or term. So, let me quote Wikipedia on it to...
  8. Sendjunks

    Source Code What to do if your pc got infected with malware?

    Best option would probably be wiping and completely reinstalling the whole operating system. If it’s some sort of rootkit, the AV will probably never find it and if it’s some type of self-spreading malware, you will have to pretty much wipe everything. Just don’t install random software that...
  9. Sendjunks

    How to Conduct a Physical Penetration Test + Tips

    Hello everyone! Please note that this is certainly not a complete outline, nor a how-to guide. This is just a basic overview of how to conduct a physical pen-test. I hope that some of you find this helpful, enjoy! Step 1: Scope and Pre-Engagement Before starting a physical penetration test...
  10. Sendjunks

    Scam Page Outlook/hotmail Scama. live/outlook/hotmail

    Download: Outlook/live Scama
  11. Sendjunks

    Scam Page Letter office365 Auto Grabber

    Download: Office 365 auto grabber
  12. Sendjunks

    Scam Page Office 365 - Simple Scama

    Download: https://filebin.net/c970fpiglfyilzkp/office.zip
  13. Sendjunks

    Scam Page Office FUD Scama

    office 365 scama for your pleasure Download: https://filebin.net/c970fpiglfyilzkp/office_22_fud-scrpt.zip
Top Bottom