Hi Guys, I am finally back to write some simple tutorials related to penetration testing. Today, I would like to discuss the privilege escalation using
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Guys, I am finally back to write some simple tutorials related to penetration testing. Today, I would like to discuss the privilege escalation using
Hi Friends, Follow up my previous post about the javascript evasion technique that the malware creator uses code obfuscation to bypass the malware protection in
Hi Reverser, Let’s do some stuff. Today I would like to share again about the malware evasion technique. Today, it is a bit different, where
Hi Analyst, Today I would like to share information on analyzing the API call to gather detailed information. Malware analyst requires understanding each API call
Hi Guys, I am finally back after busy with my relocation back to home town. Today, I would like to share how to get the
Hi Reverser, Today, I would like to share abit of my research regarding how you hide your windows API calls from static analysis. Usually, When