Posts by Category
malware_analysis
APT Attack Cases Using Dora RAT Against Korean Companies
(ASEC) found that the Andariel APT group recently attacked Korean companies, including those in education and manufac...
Mac-os malware-analysis guide
macOS malware encompasses various types of malicious software designed to target macOS systems, including adware, spy...
Record Breaker
The malware collects system information, communicates with remote servers, and can send and receive data. It may also...
Unpacking Malware
Unpacking malware involves analyzing and deconstructing the protective layers that malware authors use to obfuscate t...
Process Injection
Process Injection - DLL Injection - Part One
Alcaraz Ransomware
Inhibit System Recovery - Data Encrypted for Impact
snake-keylogger
Snake Keylogger is a malware developed using .NET
AveMariaRAT
Remote Access Trojan
practical malware Analysis
PMA book labs..7 --> 9
practical malware Analysis
PMA book labs..1 --> 6
digital-forensics
Memory Forensics With Volatility Tool
Volatility is a potent tool for memory forensics, capable of extracting information from memory images (memory dumps...
Browser Artifacts
Provide detailed insights into a user’s online activities and behaviors.
Recovering Digital Evidence
Tracing Digital Footprints: Insights into File Recovery and Data Carving