Hi Fellows, I have been reading some insightful posts on the internet concerning red teaming exercises. I am particularly interested in topics that delve into
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Fellows, I have been reading some insightful posts on the internet concerning red teaming exercises. I am particularly interested in topics that delve into
I researched an article and including training materials available on the internet to explore some creative techniques developed by researchers for injecting a malicious payload
Hello I am presenting a straightforward method to increase the difficulty for malware analysts or to evade detection by EDR. This technique is not overly
I am showing an alternative approach to embedding your payload. In this method, the focus will be on stealth as we override a legitimate function
Hi Fellow reverser Playing around with the code reversing, I am sharing a small review on the topic related to obfuscation Code obfuscation is like
Today, I am giving a small tutorial which will discuss about APC (Asynchronous Procedur Calls). The reason that I sharing this tutorial is due to