Skip to main content
deepmalware logo

Introduction

Welcome,

This archive focuses on offensive security research through the lens of adversary simulation, documenting techniques, tools, and methodologies employed in real-world engagements.

Research areas span EDR evasion primitives (sleep obfuscation, syscall proxying, memory masking), malware development for C2 frameworks (BOF engineering, PIC design patterns), and Active Directory attack chains (Kerberos abuse, delegation exploitation, credential theft).

Each analysis provides both offensive implementation details and defensive detection strategies, dissecting how sophisticated adversaries operate and how blue teams can identify their tradecraft.

Topics include AMSI/ETW bypass, post-exploitation persistence, anti-forensics techniques, and in-depth technical breakdowns of modern evasion methods.

All content is educational. Talk with us via GitHub or Discord for technical discussion.

// offensive research, good sleep at night

Next