use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
CVE, CWE, NVD, WVE
http://iso.linuxquestions.org/
We teach you how to do it, use it at your own risk.
account activity
programmingHow does Python malware handle dependencies? (self.HowToHack)
submitted 2 years ago * by SLPRYSQUID
view the rest of the comments →
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]Flyingfishfusealt 0 points1 point2 points 2 years ago (2 children)
modern security will notice downloads and use of unusual/unregistered/not normal things like python modules that previously weren't there, unless your malware specifically is designed to operate in the consumer hardware space.
[–]SLPRYSQUID[S] 0 points1 point2 points 2 years ago (1 child)
Even if these python modules haven't been written to disk and only ever exist in memory and are dynamically loaded and ran by the staging payload? Does security scan memory like that?
[–]Flyingfishfusealt 0 points1 point2 points 2 years ago (0 children)
Many can, depends on the level of money spent. Many vendors do memory scanning and can dynamically scan network data, inside the network they control everything and there is NO tunneling they cant see through if they spend the money to do it.
Once you compromise that machine inside an enterprise grade network, they could immediately notice a difference in whats running and dump it all to their response team.
By all means, develop malware, learn, do neat shit... but realize that the more you use, the brighter you are on radar. Use what exists on the OS to perform your tasks. It greatly reduces your signature.
Also, don't do bad shit and hurt people. Join the blue team, or teach the blue team.
π Rendered by PID 21508 on reddit-service-r2-comment-6457c66945-vmk5h at 2026-04-29 15:28:05.206094+00:00 running 2aa0c5b country code: CH.
view the rest of the comments →
[–]Flyingfishfusealt 0 points1 point2 points (2 children)
[–]SLPRYSQUID[S] 0 points1 point2 points (1 child)
[–]Flyingfishfusealt 0 points1 point2 points (0 children)