Executing Windows Malware through WSL (Bashware)

Oct. 24, 2017
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
Executing Windows Malware through WSL (Bashware)
1 of 18

More Related Content

What's hot

Linux advanced privilege escalationLinux advanced privilege escalation
Linux advanced privilege escalationJameel Nabbo
From zero to SYSTEM on full disk encrypted windows systemFrom zero to SYSTEM on full disk encrypted windows system
From zero to SYSTEM on full disk encrypted windows systemNabeel Ahmed
Using symfony to save time, effort and sanityUsing symfony to save time, effort and sanity
Using symfony to save time, effort and sanityJoshua May
J+sJ+s
J+shappyuk
WIndows Kernel-Land exploitationWIndows Kernel-Land exploitation
WIndows Kernel-Land exploitationkyaw thiha
Introduction to Linux Privilege Escalation MethodsIntroduction to Linux Privilege Escalation Methods
Introduction to Linux Privilege Escalation MethodsBishop Fox

Similar to Executing Windows Malware through WSL (Bashware)

Linux Server Security and HarderingLinux Server Security and Hardering
Linux Server Security and Harderingvidalinux
Kali presentationKali presentation
Kali presentationZain Ul abadin
VCS, Containers & Low-codeVCS, Containers & Low-code
VCS, Containers & Low-codeJoel Quintyn
Infosecurity.be 2019: What are relevant open source security tools you should...Infosecurity.be 2019: What are relevant open source security tools you should...
Infosecurity.be 2019: What are relevant open source security tools you should...B.A.
Linux for embedded_systemsLinux for embedded_systems
Linux for embedded_systemsVandana Salve
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionAnti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detectionNeel Pathak

Similar to Executing Windows Malware through WSL (Bashware)(20)

Recently uploaded

Salesforce @AXA.pdfSalesforce @AXA.pdf
Salesforce @AXA.pdfPatrickYANG48
DevOps and SF.pdfDevOps and SF.pdf
DevOps and SF.pdfPatrickYANG48
A Guide to Java Dynamic Proxies and It in CodingA Guide to Java Dynamic Proxies and It in Coding
A Guide to Java Dynamic Proxies and It in CodingMikeConner22
TorfsBot or Not? Evaluating User Perception on Imitative Text Generation (CLI...TorfsBot or Not? Evaluating User Perception on Imitative Text Generation (CLI...
TorfsBot or Not? Evaluating User Perception on Imitative Text Generation (CLI...Thomas Winters
Document WhatsApp MessagingDocument WhatsApp Messaging
Document WhatsApp MessagingGeminate Consultancy Services
Why Should You Choose a Personal Trainer over Group Gym Classes?  Why Should You Choose a Personal Trainer over Group Gym Classes?  
Why Should You Choose a Personal Trainer over Group Gym Classes?  Neighborhood Trainer

Executing Windows Malware through WSL (Bashware)