Hi Geeks, I just want to post a small post related to JWT code. Recently, when I was analyzing a web that use JWT to
Memory Protection Fluctuation
Hi Brother I am writting this short tutorial just to share a bit basic on how the malware evade the memory scanning. This is not
Windows API Hooking
Hi Friend Reading some article on how the EDR able to hook its API into windows API to detect the malicious interaction between application and
Basic File Information Query (NtQueryInformationFile)
Hi Guys, I would like to share a small chunk of code to get the basic file information. This code is the basic and the
Cyber Triage
Hi Friend, I am writting this to share experience using an application called Cyber Triage which really helps on the endpoint investigation. https://www.cybertriage.com/ As you
Timestomping
Hi Friend It is been a while of not updating this blog. It does not mean I stop doing some research. Today, i would like