Hi Guys, Today I am gonna share how to locate ransomware encryption process using process monitor and pin point the function address in IDA to
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Guys, Today I am gonna share how to locate ransomware encryption process using process monitor and pin point the function address in IDA to
Hi Guys, I want to share a feature in IDA that help you to do static analyses more easy. I have an application that will
Hi Guys, Today I am going to continue my previous tutorial that after we can repair the import table of dumped PE from the memory.
Hi Guys, I want to share a tutorial on how to reconstruct import table of a PE. Basically there is no magic thing here. Why
Hi Guys, In my previous post we discussed about how to hide the API call with the help of dynamic loading so that the API
I would like to share a very simple way of hiding your API call from static analyses. Actually, there are many ways to hide it