malware analysis
WannaCry, two years later: a deep look into its code
My own reverse engineering of a WannaCry sample.
malware analysis
My own reverse engineering of a WannaCry sample.
CTF
...or in other words, when failing to reverse a CTF binary makes you loose a job
reverse engineering
During last months, my interest in hardware hacking got an exponential growth due to the fact I had the chance to get my hands on some so-ho routers unretired from local Telcos. So what a great opportunity to open and try to crack them, without worrying about irreparable damage? Inspecting
malware analysis
In this post we continue the analysis of the Pony sample.
malware analysis
In this post we go further into the analysis of the sample unpacked in the previous part.
malware analysis
During my day by day job, I had the chance to came across a mail that was blocked by an antispam platform. Attached to this mail there was a sample recognized as a variant of Pony Stealer malware. Since I've been greatly interested into malware analysis in the