Hey there, forensic enthusiasts!. I’m glad to share some insights about a tool I developed to assist with process forensic analysis—the Process Tree Analysis Tool.
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hey there, forensic enthusiasts!. I’m glad to share some insights about a tool I developed to assist with process forensic analysis—the Process Tree Analysis Tool.
Hi friends, I want to discuss about the .net serialization which lately become a quite hot. There are alot of discussion about the detail of
Hi Friend, I would like to give a simple tutorial on windows programming to escalate your priviledge token programatically. In this tutorial is to enable
I would like to write about basic runtime dll injection which one method that used by malware creator to inject their process to other application.
Hi Guys, It is been one or two weeks that I am not writting to my blog. There are too many ideas in my head
Hi Guys Finaly i am back with pentesting tutorial after few weeks discussing about reverse engineering (assembly). Usually after you get access to the database