- A theoretical collection of techniques and methods for creating or evolving metamorphic malware. Manual or a set of guidelines used by malware developers to build new, more evasive strains of malware that rewrite their entire code.
- A resource that explains the various metamorphic techniques. How malware authors achieve code rewriting, instruction reordering, register renaming, and other advanced evasion tactics.
- A fictional or informal term used to describe the highly sophisticated methods employed by threat actors to make their malware completely transform its appearance and behavior to bypass security measures.
You can access the my awesome lists here
Contributions of any kind welcome, just follow the guidelines!
