Articles:
Polymorphic engines – Trigger – SLAM #4

Code:
http://vx.netlux.org/lib/static/vdat/tupoleng.htm

Polymorphism ant Intel instruction format – LiTlLe VxW – 29A #7

Code:
http://vx.netlux.org/29a/29a-7/Articles/29A-7.027

Guide to improving Polymorphic Engines – Rogue Warrior

Code:
http://vx.netlux.org/lib/vrw02.html

???????????: ??? ?????? (Polymorphism: what’s next) – Z0mbie (rus)

Code:
http://z0mbie.daemonlab.org/poly.html

????????? ???????????????? ?????? (Concept of the undetectable virus) – RedArc – INOZ #2 (rus)

Code:
http://www.thehackademy.net/madchat/vxdevl/vxmags/inoz2rus/inoz2/02-ARTICLES/05.htm

Advanced polymorphic engine construction – The Mental Driller – 29A #5

Code:
http://vx.netlux.org/29a/29a-5/29a-5.204

Polymorphism and grammars – Qozah – 29A #4

Code:
http://vx.netlux.org/29a/29a-4/29a-4.207

Chomsky Hierarchy and the Word Problem in Code Mutation – SPTH

Code:
http://spth.host.sk/chomsky.txt

??????????? ????????? ? ???????? ?? ?????? ?????????? ????????? ? ???????? ????????? – Pawa (rus)

Code:
http://vx.netlux.org/lib/vpa00.html

Stealth api-based decryptor – kaze – EOF/DR/RRLF zine (fr & eng)
fr (original paper):

Code:
http://fat.next-touch.com/data/win32.leon.pdf

eng:

Code:
http://www.eof-project.net/articles/kaze/stealthapidec.html

Theme: Metamorphism – Benny – 29A #4

Code:
http://vx.org.ua/29a/29a-4/29a-4.216

Metamorphism essay (part I) – Billy Belcebu – XINE #4

Code:
http://mirror.sweon.net/madchat/vxdevl/vxmags/xine-4/XINE-4.105

Metamorphism essay (part II) – Billy Belcebu – XINE #5

Code:
http://mirror.sweon.net/madchat/vxdevl/vxmags/xine-5/XINE-5.103

Vecna’s colums (Upgrade yourself!) – Vecna – XINE #5

Code:
http://mirror.sweon.net/madchat/vxdevl/vxmags/xine-5/XINE-5.008

Metamorphism in practice or “How I made MetaPHOR and what I’ve learnt” – The Mental Driller – 29A #6

Code:
http://vx.netlux.org/lib/vmd01.html

Metamorphism (part 1) – Z0mbie – MATRiX #2

Code:
http://z0mbie.daemonlab.org/meta1.txt

Some ideas about metamorphism – Z0mbie

Code:
http://z0mbie.daemonlab.org/meta2_e.txt

Automated reverse engineering: Mistfall engine – Z0mbie – MATRiX #3

Code:
http://z0mbie.daemonlab.org/autorev.txt

??????????? ???????????????? ?????? (Methodology of undetectable virus) – Z0mbie (rus)

Code:
http://z0mbie.daemonlab.org/undetect.txt

Permutation conditions – Z0mbie – 29A #8

Code:
http://z0mbie.daemonlab.org/pcond.txt

? ?????????? (about permutation) – Z0mbie (rus)

Code:
http://z0mbie.daemonlab.org/permut.html

Code transformation and finite automatons – Z0mbie

Code:
http://z0mbie.daemonlab.org/automaton_e.txt

Long Time Mutation Engine – 451 #1

Code:
http://mirror.sweon.net/madchat/vxdevl/vxmags/451/04.html

Metamorphism – Lord Julus – 29A #5

Code:
http://vx.org.ua/29a/29a-5/29a-5.203

Lord Julus’ Metamorphism Demo – 29A #5

Code:
http://vx.org.ua/29a/29a-5/29a-5.216

Code integration on Linux: Cooking the PIE – herm1t – EOF/DR/RRLF zine

Code:
http://www.eof-project.net/articles/herm1t/cookthepie.html

The Molecular Virology of Lexotan32: Metamorphism Illustrated – Orr

Code:
http://www.openrce.org/articles/full_view/29

The Viral Darwinism of W32.Evol – Orr

Code:
http://www.openrce.org/articles/full_view/27

Metamorphic Virus: Analysis and Detection – Evgenious Konstantinou

Code:
http://www.ma.rhul.ac.uk/static/techrep/2008/RHUL-MA-2008-02.pdf

Hunting for Metamorphic – Peter Szor, Peter Ferrie

Code:
http://pferrie.tripod.com/papers/metamorp.pdf

Principles and Practise of X-raying – Frederic Perriot, Peter Ferrie

Code:
http://pferrie.tripod.com/papers/x-raying.pdf

Normalizing Metamorphic Malware Using Term Rewriting – Rachit Mathur

Code:
http://www.ma.rhul.ac.uk/static/techrep/2008/RHUL-MA-2008-02.pdf

Software Transformations to Improve Malware Detection – Mihai Christodorescu, Somesh Jha, Johannes Kinder, Stefan Katzenbeisser, Helmut Veith

Code:
http://www.forsyte.cs.tu-darmstadt.de/~kinder/download.php?t=1&k=jicv07

Sources:
EXample POlymorphic (EXPO) engine – Z0mbie

Code:
http://z0mbie.daemonlab.org/expo.zip

Benny’s Polymorphic Engine for Win32 – Benny – 29A #4

Code:
http://vx.netlux.org/29a/29a-4/29a-4.303

Expressway To My Skull (ETMS) v0.36 – b0z0 – Xine #5

Code:
http://mirror.sweon.net/madchat/vxdevl/vxmags/xine-5/XINE-5.300

MultiMedia eXtensions Engine (MMXE) v1.01 – Billy Belcebu – Xine #4

Code:
http://mirror.sweon.net/madchat/vxdevl/vxmags/xine-4/XINE-4.301

Win32.Tuareg – The Mental Driller – 29A #5

Code:
http://vx.netlux.org/29a/29a-5/29a-5.708

Win32.Dengue Hemorrhagic Fever – GriYo – 29A #5

Code:
http://vx.netlux.org/29a/29a-5/29a-5.705

Win32.CTX Phage – GriYo – 29A #4

Code:
http://vx.netlux.org/29a/29a-4/29a-4.520

Win32.Parvo – GriYo – 29A #4

Code:
http://vx.netlux.org/29a/29a-4/29a-4.521

Win32.Boundary – roy g biv – RRLF #7

Code:
http://vx.netlux.org/src_view.php?file=boundary.zip

Win32.Leon – Kaze – EOF/DR/RRLF zine

Code:
http://www.eof-project.net/sources/kaze/Win32.Leon.rar

Linux.Lacrimae – herm1t – EOF/DR/RRLF zine

Code:
http://www.eof-project.net/sources/herm1t/Linux.Lacrimae.rar

BI-PERM v0.2 – Malum – EOF/DR/RRLF zine

Code:
http://www.eof-project.net/sources/Malum/Bi-Perm_v0.2.rar

Win32.Miss Lexotan 6mg – Vecna – 29A #6

Code:
http://vecna.hellsparty.com/ALL/lexotan32.zip

Win95.Ramones – Vecna – 29A #6

Code:
http://vecna.hellsparty.com/ALL/w95ramones.zip

Win95.Regswap – Vecna – 29A #6

Code:
http://vecna.hellsparty.com/ALL/w95regswap.zip

Mistfall 2.0 – Z0mbie – 29A #8

Code:
http://z0mbie.daemonlab.org/mistfall2.zip

Mistfall.Z0MBiE-10.d (Zmist) – Z0mbie

Code:
http://z0mbie.daemonlab.org/z10d.zip

Real Permutating Engine for Win32 (RPME) – Z0mbie

Code:
http://z0mbie.daemonlab.org/rpme.zip

Win32/Linux.MetaPHOR v1D – The Mental Driller – 29A #8

Code:
http://mirror.sweon.net/madchat/vxdevl/vxsrc/Win32/Win32.MetaPHOR.1D/METAPHOR.ASM

Benny’s Metamorphic Engine for Win32 beta 1

Code:
http://vx.org.ua/29a/29a-6/29a-6.316

Deviator’s Morphing Engine by Deviator – Deviator – MATRiX #3

Code:
http://mirror.sweon.net/madchat/vxdevl/vxmags/mtx3/MTX%233/Tools/MTX-3.432

Win32.Rammstein – Lord Julus – 29A #5

Code:
http://vx.netlux.org/29a/29a-5/29a-5.704

BlueOwls Light Meta – BlueOwl – RRLF #6

Code:
http://mirror.sweon.net/madchat/vxdevl/vxmags/rrlf6/utilities/blm.htm

from:

Code:
http://vx.eof-project.net/viewtopic.php?id=338

Greetz Zer0Flag

Explore More

EU Police learning hacking tricks. They are about to “Remote search” your PCs.

Law enforcement at European Union is working on ethical hacking proposal that will allow them to remotely access and monitor any PC without warrant. This is adopted after a decision

Methods of Making Your Trojans/Bots F/Undetecable

1. Crypters/Binders. This is By far the most Common Way to Make Your Trojan Undetectable. Almost everyone Who Makes There Trojans Undetectable Uses a Public Crypter, My First Public Crypter,

How does the form-based authentication scheme work?

The form-based authentication scheme works in the following manner: * A client generates a request for a protected resource (e.g. a transaction details page). * The Internet Information Server (IIS)