malware analysis Project Sodinokibi Malware Bazaar and VirusTotal platforms revealed some interesting insights into who manages Sodinokibi, from the perspective of incident response.
malware analysis WannaCry, two years later: a deep look into its code My own reverse engineering of a WannaCry sample.
CTF An extensive step by step reverse engineering analysis of a Linux CTF binary ...or in other words, when failing to reverse a CTF binary makes you loose a job
embedded device How to fix and boot Kali Linux on the SolidRun CuBox-i4Pro In this tutorial we'll fix U-Boot on default Kali Linux 2018.4 on the SolidRun Cubox-i4Pro.
reverse engineering Reverse engineering the router Technicolor TG582N During last months, my interest in hardware hacking got an exponential growth due to the fact I had the chance to get my hands on some so-ho routers unretired from
malware analysis Pony stealer: a malware analysis - The sample analysis - Part three In this post we continue the analysis of the Pony sample.
malware analysis Pony stealer: a malware analysis - The sample dry run - Part two In this post we go further into the analysis of the sample unpacked in the previous part.
malware analysis Pony stealer: a malware analysis - Unpacking the sample - Part one During my day by day job, I had the chance to came across a mail that was blocked by an antispam platform. Attached to this mail there was a sample recognized as a variant of Pony Stealer malware. Since I've been greatly interested into
CTF Vulnhub Homeless - Writeup This writeup covers the Vulnhub CTF machine named Homeless by Min Ko Ko.