MalGhost

MalGhost

Offensive Security Research

Explore advanced malware development techniques, defense evasion, and Red Team operations. Technical content for security researchers.

XOR Encryption: Breaking Down Encryption and Evading Signatures
Featured Article
35 min
#cryptography#obfuscation#encryption

XOR Encryption: Breaking Down Encryption and Evading Signatures

Learn to encrypt and obfuscate shellcodes using XOR. From cryptographic theory to practical implementations that make detections harder.

David Herrera
David Herrera Shac0x
Read more

Popular Topics

View all articles

Latest Articles