Hi Reverser, Today, I would like to share abit of my research regarding how you hide your windows API calls from static analysis. Usually, When
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Reverser, Today, I would like to share abit of my research regarding how you hide your windows API calls from static analysis. Usually, When
Hi Friends, Learning how malware creator develops their code is very inspiring because it has some tricks to ensure their application could bypass the security
Hi Guys Today, I am going to share about the basic or simple technique for the malware analyst to extract payload or binary from the
Hi Guys, I want to share my PoC with some EDR. I found it interesting that all the product cannot detect SMBghost exploitation related to the
Hi Guys, As the malware developer, we need to successfully ensure our malware is delivered to the endpoint. We know that there are so many
Hi Guys, I would like to continue my previous post regarding the hiding strings from the malware analyst or antimalaware software. There are many techniques