I like to share about how to generate a .sig file in order to help IDA to detect the function during reversing the code. It
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
I like to share about how to generate a .sig file in order to help IDA to detect the function during reversing the code. It
I would like to discuss the attack that happened on May 2021 to one of the biggest web programming language that support about 79% web
Here is the next post that I promissed to create a simple list of the export function manually with C code. Why parsing manually of
Today, I want to write about small C code that enable you to listing out dll export and parsing some PE values from the headers.
Hi Fellows, After quite sometimes that having no update on the blog especially things related to reverse engineering. In this session, I would like to
Hi Friends, I found small features in the powershell that allow you to do administrative capability with just a normal user. The Just Enough Administration