Posts by Category
Malware Development
Malware Development: Crafting Digital Chaos 0x9: Private vs Mapped memory
Article 10 of Malware Development series
Malware Development: Crafting Digital Chaos 0x8: APC Injection
Article 9 of Malware Development series
Malware Development: Crafting Digital Chaos 0x7: Thread Hijacking techniques
Article 8 of Malware Development series
Malware Development: Crafting Digital Chaos 0x6: Undocumented structures
Article 7 of Malware Development series
Malware Development: Crafting Digital Chaos 0x5: Data Exfiltration
Article 6 of Malware Development series
Malware Development: Crafting Digital Chaos 0x4: Command and Control
Article 5 of Malware Development series
Malware Development: Crafting Digital Chaos 0x3: Local and Remote DLL Injection
Article 4 of Malware Development series
Malware Development: Crafting Digital Chaos 0x2: Embedding encrypted payloads in resource section
Article 3 of Malware Development series
Malware Development: Crafting Digital Chaos 0x1: Simple Payload Execution
Article 2 of Malware Development series
Malware Development: Crafting Digital Chaos 0x0: Basics
Article 1 of Malware Development series
Malware Analysis
AsyncRAT config extraction and analysis
In depth analysis of AsyncRAT
Exposing Snake Keylogger - Analysis and Detection
In depth analysis of Snake Keylogger
My eCMAP review
After obtaining eCMAP, In this post I'll be writing about the content to study and the final exam
Unpacking KOVTER Malware
here I demonstrate how to unpack KOVTER malware
Deep Analysis of brbbot malware
Deep analysis of brbbot trojan malware [config decryption, exfiltrated data, network communication, and more]
CTF
NahamCon CTF 2024 - Writeups
Some of the challenges I solved during NahamCon CTF 2024
n00bz CTF 2022 writeups - RE
Writeups for all n00bz CTF 2022 RE challenges