Hi Hacker There is a long discussion on the EDR evasion techniques available in many communities. I am interested in writing this in my blog
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Hacker There is a long discussion on the EDR evasion techniques available in many communities. I am interested in writing this in my blog
Today, I want to share a simple tutorial related to malware analysis that talks about running the shellcode for simulation purposes When we are at
Hi Fellow Friends, Finally, I can write this blog space again after sometimes focusing on another thing. Today, I would like to write about reversing
Hi Friends, Follow up my previous post about the javascript evasion technique that the malware creator uses code obfuscation to bypass the malware protection in
Hi Reverser, Let’s do some stuff. Today I would like to share again about the malware evasion technique. Today, it is a bit different, where
Hi Analyst, Today I would like to share information on analyzing the API call to gather detailed information. Malware analyst requires understanding each API call