UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
mdmz_book.pdf
70.4 MB
MD MZ

The result of self-research and
investigation of malware development
tricks, evasion techniques and
persistence

Support: https://cocomelonc.github.io/book/2022/07/16/mybook.html
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
πŸ–₯ Types of malware

▢️Let's start by discussing some of the most common types of malware. There are many different categories, but we can start by talking about viruses, worms, and trojans. Viruses are pieces of code that attach themselves to other programs and replicate themselves, often causing damage in the process. Worms are similar to viruses, but they are self-replicating and can spread across networks without human intervention. Trojans are pieces of software that appear to be legitimate but actually have a hidden, malicious purpose.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
πŸšͺ Backdoors
πŸšͺ

🟑Malware with a backdoor capability allows an attacker to breach normal authentication or encryption in a computer, product, or embedded device, or sometimes its protocol. Backdoors provide attackers with invisible access to systems, enabling them to remotely control the victim’s machine for various malicious activities.
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from β˜˜οΈ { π”–π” π”žπ”―π”©π”’π”±π”±π”ž'𝔰 𝔏𝔬𝔲𝔫𝔀𝔒 } ☘️
⬇️ Downloaders

🟑Downloaders are a type of malware that, once installed on a victim’s system, downloads and installs other malicious software. These are often used in multi-stage attacks where the downloader serves as a means to bring in more advanced, and sometimes tailored, threats onto the compromised machine.
Please open Telegram to view this post
VIEW IN TELEGRAM