Hi Fellow Friends, Finally, I can write this blog space again after sometimes focusing on another thing. Today, I would like to write about reversing

Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Fellow Friends, Finally, I can write this blog space again after sometimes focusing on another thing. Today, I would like to write about reversing
Hi Friends, Follow up my previous post about the javascript evasion technique that the malware creator uses code obfuscation to bypass the malware protection in
Hi Reverser, Let’s do some stuff. Today I would like to share again about the malware evasion technique. Today, it is a bit different, where
Hi Analyst, Today I would like to share information on analyzing the API call to gather detailed information. Malware analyst requires understanding each API call
Hi Guys Today, I am going to share about the basic or simple technique for the malware analyst to extract payload or binary from the
I would like to continue my previous post related strings extraction from the malware. We should have known that the initial steps for the malware