My Friends, Just a quick simple and very basic tutorial on how to create an automation to extract malware configuration from PE file. I made
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
My Friends, Just a quick simple and very basic tutorial on how to create an automation to extract malware configuration from PE file. I made
Hi Malware Developer Looking at some malware sample arround, I would like to share one of many ways on how malware identify its environment in
Hi Malware Developer As I mention in the previous post that offensive developer has no limit on creativity to develop the malware especially techniques to
Hi Malware Analyst, I would like to discuss SigFlip evasion technique in order to bypass Authenticode check of a PE. Just a little background, One
Hi Malware Analyst Reading some fantastic report from many other security researcher is very fun. The techniques of the adversaries is always growing and their
Hi Incident Responder Today, I am going to share experience on using Cyber Triage application on making the triage analysis of an incident. Compromise Simulation