I am showing an alternative approach to embedding your payload. In this method, the focus will be on stealth as we override a legitimate function
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
I am showing an alternative approach to embedding your payload. In this method, the focus will be on stealth as we override a legitimate function
Hi Fellow reverser Playing around with the code reversing, I am sharing a small review on the topic related to obfuscation Code obfuscation is like
Today, I am giving a small tutorial which will discuss about APC (Asynchronous Procedur Calls). The reason that I sharing this tutorial is due to
Hi Guys Today, I will be sharing fundamental concepts malware development. This session will focus on the elementary aspects of executing a malicious payload with
I am sharing my pentesting exercise regarding ADCS exploitation. There are numerous misconfigurations on ADCS that can be exploited. Today, I will be discussing a
Hi colleagues and fellow forensic examiners, today I will be sharing some forensic evidence from an exercise I conducted to keep my skills sharp. I