| domain | fluxsec.red |
| summary | Here’s a summary of the website content:
The website explores advanced malware development trends, focusing on the increasing use of Rust and Go due to difficulties in decompiling traditional languages. Rust’s performance and features, including its Foreign Function Interface for C compatibility and improved memory safety, make it a compelling choice. It details research into novel techniques like SSDT Hooking (“Hells Hollow”), analysis of Iranian spyware (“MuddyWater”), exploring undocumented Windows features via alt syscalls and kernel event tracing (ETW), and developing a Rust-based EDR proof-of-concept (“Sanctum EDR”). The content also covers topics such as reverse engineering, rootkit detection, and techniques for bypassing EDR systems. |
| title | About Me - 0xflux Red Team Manual | Systems programming |
| description | This is my personal knowledge base on Rust malware development, red teaming and ethical hacking. |
| keywords | rust, windows, injection, driver, ghost, hunting, blog, kernel, detection, offensive, evasion, development, sanctum, hooking, building, system, security |
| upstreams |
|
| downstreams |
|
| nslookup | A 62.100.206.221 |
| created | 2025-11-11 |
| updated | 2026-01-20 |
| summarized | 2026-02-03 |
|
|