👾
Malware Development Guide
search
Ctrlk
  • 🚀Introduction
  • 🐤Baby Steps
    • 📔Pre-requisite Knowledge
    • What is Malware?
    • Programming Guide
    • Vulnerability Analysis
  • 👾Basic Malware
    • Fork Bombs
    • Logical Bombs
    • Zip Bombs
    • Keyloggers
    • Wipers
    • ScreenJackers
    • Prependers and Postpenders
    • What's Next?
  • 💀Intermediate Malware
    • Browser Extensions
    • Worms
    • RATs
  • ☠️Advanced Malware
    • Botnets w/ C2 Servers
    • Rootkits and Bootkits
    • Polymorphic Malware
  • Appendix
    • Pivotingchevron-right
    • Elementary Concepts and Stuffchevron-right
    • Being Stealthychevron-right
    • Backdoors
    • Windows Process Injection
    • SIM Swapping
    • Quishing
    • RunPE
    • Malware Packers
    • Learning Resources
  • Updates n Stuff
  • Scratchpad
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Appendix

RunPE

Hiding code behind legit processes

hashtag
References

  • https://www.adlice.com/runpe-hide-code-behind-legit-process/arrow-up-right

  • https://labs.nettitude.com/blog/introducing-process-hiving-runpe/arrow-up-right

  • https://www.malwarebytes.com/glossary/runpe-techniquearrow-up-right

  • https://itm4n.github.io/vba-runpe-part1/arrow-up-right

  • https://itm4n.github.io/vba-runpe-part2/arrow-up-right

PreviousQuishingchevron-leftNextMalware Packerschevron-right

Last updated 2 years ago