Industrial Security.
Industrial Security.
Offensive Security & Explotation
Exploitation.
Exploitation.
Windows & Linux Kernel
Practical Pentesting
Practical Pentesting
Real world cybersecurity attack.
Tool Development
Tool Development
Design and develop own tool.
Shellcode.
Shellcode.
Write a shellcode step by step with NASM.
Reverse Engineering
Reverse Engineering
Reversing, debugging and protecting a software with cryptography.
[Studying] Analyzing njRAT Danger Edition 2018

[Studying] Analyzing njRAT Danger Edition 2018

READ MORE +
[Studying] Analyzing njRAT Danger Edition 2017

[Studying] Analyzing njRAT Danger Edition 2017

READ MORE +
[Studying] Analyzing Several Korean Variants of the njRAT Family

[Studying] Analyzing Several Korean Variants of the njRAT Family


Several Variants of the njRAT family… but with built-in backdoor!

READ MORE +
[Studying] Analyzing njRAT Golden Edition

[Studying] Analyzing njRAT Golden Edition

READ MORE +
[Learning] Critical Process — How Malware Protect Themselves via Blue Screen of Death

[Learning] Critical Process — How Malware Protect Themselves via Blue Screen of Death

READ MORE +
[Studying] Analyzing njRAT v0.8d

[Studying] Analyzing njRAT v0.8d

READ MORE +
[Studying] Analyzing njRAT v0.10d

[Studying] Analyzing njRAT v0.10d

READ MORE +
[Studying] Analyzing Gh0st 1.0 Alpha

[Studying] Analyzing Gh0st 1.0 Alpha

READ MORE +
[Studying] Analyzing njRAT Lime and Green Edition

[Studying] Analyzing njRAT Lime and Green Edition

READ MORE +
[Series] Inside Different Generations of Ransomware

[Series] Inside Different Generations of Ransomware

READ MORE +