Hi Friends, Learning how malware creator develops their code is very inspiring because it has some tricks to ensure their application could bypass the security
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Friends, Learning how malware creator develops their code is very inspiring because it has some tricks to ensure their application could bypass the security
Hi Guys Today, I am going to share about the basic or simple technique for the malware analyst to extract payload or binary from the
Hi Guys, I want to share my PoC with some EDR. I found it interesting that all the product cannot detect SMBghost exploitation related to the
I am going to share the common mistake of Web API. When I was a software developer a long time ago, We need to develop
Hi Guys, As the malware developer, we need to successfully ensure our malware is delivered to the endpoint. We know that there are so many
Hi Guy, I want to share my experience during my pentest exercise, either in the lab or in the real environment. I write this article