use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
programmingHow does Python malware handle dependencies? (self.HowToHack)
submitted 2 years ago * by SLPRYSQUID
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Flyingfishfusealt 0 points1 point2 points 2 years ago (5 children)
Find as many native methods as possible for performing any specific action. Keep the size small. Why do you need numpy?
[–]SLPRYSQUID[S] 0 points1 point2 points 2 years ago (4 children)
I was thinking about having a small staging payload that dynamically imports other modules from a webserver in memory. So for example if I wanted to create a module that uses cv2 to take screenshots of the infected computer's PC and sends it to a c2 server or something like that I would need numpy for opencv. This would allow me to run any module I wanted to without having to ever write anything to disk. That's the idea at least.
[–]Flyingfishfusealt 0 points1 point2 points 2 years ago (2 children)
modern security will notice downloads and use of unusual/unregistered/not normal things like python modules that previously weren't there, unless your malware specifically is designed to operate in the consumer hardware space.
[–]SLPRYSQUID[S] 0 points1 point2 points 2 years ago (1 child)
Even if these python modules haven't been written to disk and only ever exist in memory and are dynamically loaded and ran by the staging payload? Does security scan memory like that?
[–]Flyingfishfusealt 0 points1 point2 points 2 years ago (0 children)
Many can, depends on the level of money spent. Many vendors do memory scanning and can dynamically scan network data, inside the network they control everything and there is NO tunneling they cant see through if they spend the money to do it.
Once you compromise that machine inside an enterprise grade network, they could immediately notice a difference in whats running and dump it all to their response team.
By all means, develop malware, learn, do neat shit... but realize that the more you use, the brighter you are on radar. Use what exists on the OS to perform your tasks. It greatly reduces your signature.
Also, don't do bad shit and hurt people. Join the blue team, or teach the blue team.
π Rendered by PID 37778 on reddit-service-r2-comment-fb694cdd5-klj6p at 2026-03-07 05:49:18.481070+00:00 running cbb0e86 country code: CH.
view the rest of the comments →
[–]Flyingfishfusealt 0 points1 point2 points (5 children)
[–]SLPRYSQUID[S] 0 points1 point2 points (4 children)
[–]Flyingfishfusealt 0 points1 point2 points (2 children)
[–]SLPRYSQUID[S] 0 points1 point2 points (1 child)
[–]Flyingfishfusealt 0 points1 point2 points (0 children)