Hi Guys, Today I am gonna share how to locate ransomware encryption process using process monitor and pin point the function address in IDA to
by Rio Asmara Suryadi
Hi Guys, Today I am gonna share how to locate ransomware encryption process using process monitor and pin point the function address in IDA to
Hi Guys, I want to share a feature in IDA that help you to do static analyses more easy. I have an application that will
Hi Guys, Today I am going to continue my previous tutorial that after we can repair the import table of dumped PE from the memory.
Hi Guys, I want to share a tutorial on how to reconstruct import table of a PE. Basically there is no magic thing here. Why
I want to share some experience of penetration testing on Hack the box. I am not going to give you a walkthrough about the box,
Hi Guys, We can read in many articles about kerberoasting SPN account in active directory which might give the adversaries an easy way to escalate