Hi Friends, Welcome to my blog again, Thank you for reading my blog. i would like to share a tutorial to analyze a .NET binary
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Friends, Welcome to my blog again, Thank you for reading my blog. i would like to share a tutorial to analyze a .NET binary
Hi Guys Today, I would like to share the use of IDAPyhton for you to do automation during your reversing some codes. There are use
Hi Guys, Today I am gonna share how to locate ransomware encryption process using process monitor and pin point the function address in IDA to
Hi Guys, I want to share a feature in IDA that help you to do static analyses more easy. I have an application that will
Hi Guys, Today I am going to continue my previous tutorial that after we can repair the import table of dumped PE from the memory.
Hi Guys, I want to share a tutorial on how to reconstruct import table of a PE. Basically there is no magic thing here. Why