Hi Malware Developer As I mention in the previous post that offensive developer has no limit on creativity to develop the malware especially techniques to
Cyber Security Architect | Red/Blue Teaming | Exploit/Malware Analysis
by Rio Asmara Suryadi
Hi Malware Developer As I mention in the previous post that offensive developer has no limit on creativity to develop the malware especially techniques to
Hi Malware Analyst, I would like to discuss SigFlip evasion technique in order to bypass Authenticode check of a PE. Just a little background, One
Hi Malware Analyst Reading some fantastic report from many other security researcher is very fun. The techniques of the adversaries is always growing and their
Hi Reverser Just right after weekend activities with the kids, I started to play with hack the box that I have subscribed for a very
Hi Incident Responder Today, I am going to share experience on using Cyber Triage application on making the triage analysis of an incident. Compromise Simulation
Hi Fellow Forensic I want to test Cerbero Suites in order to reverse a small powershell code that has been encoded multyple times to evade