Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Cyber Adventure
  • Malware Analysis
  • Digital Forensics
  • All Categories
    Asem Ashraf

    Asem Ashraf

    Malware Analysis & Reverse Engineering Adventures.

    • OPEN TO WORK
    • Email
    • Twitter
    • LinkedIn
    • GitHub

    Recent posts

    malware_analysis

    APT Attack Cases Using Dora RAT Against Korean Companies

    (ASEC) found that the Andariel APT group recently attacked Korean companies, including those in education and manufac...

    18 Sep 2024

    11 minute read

    malware_analysis

    Mac-os malware-analysis guide

    macOS malware encompasses various types of malicious software designed to target macOS systems, including adware, spy...

    18 Aug 2024

    5 minute read

    malware_analysis

    Record Breaker

    The malware collects system information, communicates with remote servers, and can send and receive data. It may also...

    16 Aug 2024

    10 minute read

    digital-forensics

    Memory Forensics With Volatility Tool

    Volatility is a potent tool for memory forensics, capable of extracting information from memory images (memory dumps...

    01 Jul 2024

    28 minute read

    malware_analysis

    Unpacking Malware

    Unpacking malware involves analyzing and deconstructing the protective layers that malware authors use to obfuscate t...

    18 Jun 2024

    4 minute read

    digital-forensics

    Browser Artifacts

    Provide detailed insights into a user’s online activities and behaviors.

    15 May 2024

    9 minute read

    digital-forensics

    Recovering Digital Evidence

    Tracing Digital Footprints: Insights into File Recovery and Data Carving

    01 Apr 2024

    7 minute read

    malware_analysis

    Process Injection

    Process Injection - DLL Injection - Part One

    22 Mar 2024

    7 minute read

    • Previous
    • 1
    • 2
    • Next
    • Follow:
    • Feed
    © 2024 Asem Ashraf. Powered by Jekyll & Minimal Mistakes.