Industrial Security.
Industrial Security.
Offensive Security & Explotation
Exploitation.
Exploitation.
Windows & Linux Kernel
Practical Pentesting
Practical Pentesting
Real world cybersecurity attack.
Tool Development
Tool Development
Design and develop own tool.
Shellcode.
Shellcode.
Write a shellcode step by step with NASM.
Reverse Engineering
Reverse Engineering
Reversing, debugging and protecting a software with cryptography.
[Studying] Inside GlobeImposter 2021: Multi-Stage Payload & In-Memory Execution Analysis

[Studying] Inside GlobeImposter 2021: Multi-Stage Payload & In-Memory Execution Analysis


More complex evasion methods

READ MORE +
[Studying] Analyzing GlobeImposter 2018

[Studying] Analyzing GlobeImposter 2018

READ MORE +
[Studying] Inside WannaCry: Exploit, Worming, and TOR Communication Explained

[Studying] Inside WannaCry: Exploit, Worming, and TOR Communication Explained


TOR, EternalBlue and DoublePulsar!

READ MORE +
[Studying] Analyzing WannaCry

[Studying] Analyzing WannaCry


Finally! This ransomware!

READ MORE +
[Studying] Analyzing Jigsaw

[Studying] Analyzing Jigsaw


“I want to play a game” —— Saw

READ MORE +
[Studying] Analyzing CryptoLocker

[Studying] Analyzing CryptoLocker


The first analysis article of this series!

READ MORE +
[Thoughts] Ransomware vs. RAT

[Thoughts] Ransomware vs. RAT

READ MORE +
[Studying] Analyzing Other Variants of the njRAT Family

[Studying] Analyzing Other Variants of the njRAT Family


The last article of the njRAT family… maybe?

READ MORE +
[Studying] Analyzing njRAT Danger Edition 2020

[Studying] Analyzing njRAT Danger Edition 2020

READ MORE +
[Studying] Analyzing njRAT Danger Edition 2018

[Studying] Analyzing njRAT Danger Edition 2018

READ MORE +