pwanble.kr loveletter writeup
Looking into RCE in Agent Tesla Loader
Tera C2 Source Code
Reversing malware sample found by nullcookies.
Solution to MalwareTech's Ransomware challenge.
In this article we will walk through malware analysis distributed by a hacked kwmarina.com website.
BSides 2018 presentation.
In this article we are going to talk about the following WDEG features: Code Integrity Guard, Arbitrary Code Guard and "Do not allow child processes" policy.
This time it's a simple 8-bit virtual machine! Spoilers!
In this article we are going to look at Control Flow Guards, how they work and what are the common weakenses.
This is a tutorial on how to reverse engineer shellcode in malware with Radare2. MalwareTech CTF Spoilers!
In this article we will learn how DEP works and what are the most common exploitation techniques to bypass it.
In this article, we are going to review ASLR, Mandatory ASLR, and Bottom Up/High-entropy ASLR.
In this article we are going to discuss what is SEHOP, how it is related to SafeSEH and what is its role in exploitation.
I am attending SEC760 in Washington D.C. Bookmark this page for review.
Meet me at BSides in San Diego on June 9th, 2018 to learn more about exploitation and exploit mitigation techniques available in Windows Defender Exploit Guard.
Stay up to date! Get all the latest & greatest posts delivered straight to your inbox