Introduction Recently, I downloaded a malware sample from Malware Bazaar for analysis. As I began reverse engineering it using Binary Ninja, I discovered something particularly
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Introduction Recently, I downloaded a malware sample from Malware Bazaar for analysis. As I began reverse engineering it using Binary Ninja, I discovered something particularly
In the digital shadows where hackers and security pros play a constant game of cat and mouse, every little advantage counts. For malware creators, this
Ever wondered how attackers manage to sneak their malicious code into running programs without triggering alarms? The answer often lies in a sophisticated technique called
Malware analysis is a critical yet intricate task in cybersecurity, often requiring analysts to reverse-engineer complex binaries to uncover malicious behavior. With the rise of
Hi Fellows, I have been reading some insightful posts on the internet concerning red teaming exercises. I am particularly interested in topics that delve into
I researched an article and including training materials available on the internet to explore some creative techniques developed by researchers for injecting a malicious payload