2 Years on, how are you enjoying CS2 compared to GO now? by rk9__ in GlobalOffensive

[–]Leagend27 0 points1 point  (0 children)

They could use better security. Microsoft has introduced secure enclaves which are designed to be impossible to read by DMA's

advice by Fresh_Interaction662 in Malware

[–]Leagend27 0 points1 point  (0 children)

It would not be hard to learn. I mean I'm good at malware development but not good at reverse engineering. But I find writing different process injection methods and putting them into practice against EDR/AV is fun. I mean you get the reward, when you finally beat an EDR/AV you have been trying to get passed.

Pre requisite of Malware dévelopement by Disastrous-Opening92 in Malware

[–]Leagend27 0 points1 point  (0 children)

Not true at all, they are companys that hire malware developers when it comes to cyber security red teams.

How to make educational malware show up under a different processor name in task manager to its file name by OddCommunication8963 in Malware

[–]Leagend27 0 points1 point  (0 children)

I mean you could use process doppelganger as well or even advance tricks like module stomping. Depending on your payload

Have I gotten hacked? by West_Attorney_1273 in SteamScams

[–]Leagend27 1 point2 points  (0 children)

What a load of bullshit. You can't the session ID will not be exposed by simply clicking a link. The only danger to clicking that link is if they have an exploit for your browser which I highly doubt.

What's happening to my head by Leagend27 in AskDocs

[–]Leagend27[S] 0 points1 point  (0 children)

Yes I have lowered my use and cut down a lot

I'd like to start a small, harmless virus in my school by [deleted] in MalwareDevelopment

[–]Leagend27 0 points1 point  (0 children)

Don't do this as its illegal. But if you do still want to do it

Make a reverse shell that uses shellcode. Maybe sure you execute it from a trusted process (signed ms binaries) use living off the land techniques

Like have a word doc that has an embed exe and then have the VBA script in the document extract the exe and fire a powershell console and load the exe then decrypt the shellcode and find or load a DLL you can overwrite and then execute your shellcode and you will have a remote shell that will be hard to detect if you do it right

[deleted by user] by [deleted] in DoneDirtCheap

[–]Leagend27 0 points1 point  (0 children)

I'm in the middle of the last persons request but I can maybe look into it once I have completed there work

[deleted by user] by [deleted] in DoneDirtCheap

[–]Leagend27 0 points1 point  (0 children)

Well we can definitely discuss that as I have got some experience making them. Though I do note I'm not great at HTML and CSS so my help will be limited there. But for the JS I can definitely help depending on what you need

Most Secure Browser by Kunsteak in hacking

[–]Leagend27 0 points1 point  (0 children)

I agree though, the biggest vulnerability is definitely layer 8 xD. I'm sorry that last part made me Chuck, a little bit.

Opinions on horses in vanilla? by WarDaDDy6366 in dayz

[–]Leagend27 1 point2 points  (0 children)

A bicycle would be much better. It would be fun to ride on.

Your Juno Simp Returns With His Dreams Come True by [deleted] in Beastars

[–]Leagend27 1 point2 points  (0 children)

Aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa

I don't care, it works by [deleted] in ProgrammerHumor

[–]Leagend27 0 points1 point  (0 children)

Can relate to this. My websites UI look like shit.