I researched an article and including training materials available on the internet to explore some creative techniques developed by researchers for injecting a malicious payload
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
I researched an article and including training materials available on the internet to explore some creative techniques developed by researchers for injecting a malicious payload
Hello I am presenting a straightforward method to increase the difficulty for malware analysts or to evade detection by EDR. This technique is not overly
I am showing an alternative approach to embedding your payload. In this method, the focus will be on stealth as we override a legitimate function
Hi Fellow reverser Playing around with the code reversing, I am sharing a small review on the topic related to obfuscation Code obfuscation is like
Today, I am giving a small tutorial which will discuss about APC (Asynchronous Procedur Calls). The reason that I sharing this tutorial is due to
Hi Guys Today, I will be sharing fundamental concepts malware development. This session will focus on the elementary aspects of executing a malicious payload with