Ever wonder how sneaky malware tries to avoid getting caught? One clever trick they use involves the Windows Registry, that super important database where your
Shellcode & The Art of In-Memory Code Injection: A Deep Dive for Security Enthusiasts
Ever wondered how attackers manage to sneak their malicious code into running programs without triggering alarms? The answer often lies in a sophisticated technique called
Supercharging Malware Analysis in Binary Ninja: Automated String IOC Lookup with VirusTotal
Malware analysis is often a race against time. Analysts meticulously dissect malicious code, searching for clues, indicators of compromise (IOCs), and a deeper understanding of
Exploring the Process Tree Analysis Tool: A Helpful Ally in Malware Forensics
Hey there, forensic enthusiasts!. I’m glad to share some insights about a tool I developed to assist with process forensic analysis—the Process Tree Analysis Tool.
Using AI to Rename Variables Like a Pro
Hey, Let’s Make Code Easier to Read! Ever looked at decompiled code and groaned at names like var_18 or var_1c? They’re about as helpful as a map with
Enhancing Malware Analysis with AI: Step Two – Function Renaming in HLIL Code
In my previous blog post, I discussed how artificial intelligence can enhance malware analysis by improving code analysis workflows. Continuing that journey, this post focuses