| domain | fluxsec.red |
| summary | The content discusses various aspects of modern malware development and cybersecurity techniques. It highlights the adoption of programming languages like Rust and Go due to their performance, security benefits, and compatibility with C libraries. The text also delves into a specific malware called DCHSpy using a technique named SSDT Hooking within DCHSpy, analyzing an Iranian APT group's MuddyWater free VPN mobile spyware. Other topics include Alt Syscalls for Windows 11, reverse engineering undocumented features of the Windows Kernel, detection methods through Full Spectrum Event Tracing for Windows (ETW) in the kernel against rootkits, and the development of a Rust-based EDR proof-of-concept known as wdk-mutex. Additionally, it mentions monitoring NTDLL for memory patching using Rust, focusing on improving threat intelligence and ETW patching techniques. |
| title | About Me - 0xflux Red Team Manual | Systems programming |
| description | This is my personal knowledge base on Rust malware development, red teaming and ethical hacking. |
| keywords | rust, windows, injection, driver, ghost, hunting, blog, kernel, detection, offensive, development, evasion, hooking, sanctum, building, event, tracing |
| upstreams |
|
| downstreams |
|
| nslookup | A 62.100.206.221 |
| created | 2025-11-11 |
| updated | 2025-11-24 |
| summarized | 2025-11-25 |
|
|