Recent posts
AsyncRAT config extraction and analysis
In depth analysis of AsyncRAT
Exposing Snake Keylogger - Analysis and Detection
In depth analysis of Snake Keylogger
My eCMAP review
After obtaining eCMAP, In this post I'll be writing about the content to study and the final exam
Unpacking KOVTER Malware
here I demonstrate how to unpack KOVTER malware
Deep Analysis of brbbot malware
Deep analysis of brbbot trojan malware [config decryption, exfiltrated data, network communication, and more]