Skip to content

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis

by Rio Asmara Suryadi

  • Home
  • Penentration Test
  • Reverse Engineering
  • Malware
  • About

Month: June 2021

25 Bytes of every function in NTDLL

June 20, 2021 rioasmara

Hi Friends, I am writing this code as part of EDR Evasion technique that has been discussed in my previous posting. So what is this

Continue reading

SYSCALL API EDR Hooking

June 13, 2021 rioasmara

Hi Hacker There is a long discussion on the EDR evasion techniques available in many communities. I am interested in writing this in my blog

Continue reading

Cobalt Strike Beacon with Shellter

June 12, 2021 rioasmara

Hi Guys, I am continuing my previous post that related to embedding the cobalt strike beacon with evasion tools to enable the safe payload delivery.

Continue reading

Malleable C2 Cobalt Strike

June 6, 2021 rioasmara

Hi Hackers, I want to discuss creating a cobalt strike malleable C2 profile that handles the beacon connection. By setting up it properly, we can

Continue reading

root#whoami

Unknown's avatarRio Asmara Suryadi is a highly experienced cybersecurity professional with over 20 years in the field, specializing in cyber defense, malware analysis, penetration testing, and security architecture across diverse industries including Oil & Gas, Banking, and Energy. He possesses a strong background in leading SOC operations, threat hunting, implementing robust security solutions, and has a notable history of software development. Rio is also dedicated to knowledge sharing, evidenced by his cybersecurity blog and his role as the founder of Beruang Cyber, a cybersecurity community in Indonesia.

Recent

  • MFT Reader: A Forensic Analyst’s Guide to Finding What Happened on Disk
  • AdaptixPowerShell: Get Your C2 Payload to the Target Without Getting Caught
  • Revolutionizing Incident Response: How AI-Powered Forensic Analysis Transforms CyberTriage Investigations
  • The Silent Kill Chain: From RID Cycling to AD CS Template Injection
  • Supercharging Velociraptor with AI and Cursor
Blog at WordPress.com.
  • Subscribe Subscribed
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Join 43 other subscribers
    • Already have a WordPress.com account? Log in now.
    • Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar