LIGHT
DARK
Home
About
Contact Me
RSS
Archive.
2025
Threat Actor Profile: APT27
Egypt Post Impersonation Linked to Smishing Triad
Flesh Stealer: A Report on Multivector Data Theft
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
Six Months Undetected: Analysis of archive.org hosted .NET PE Injector
2024
Analysis of Nova: A Snake Keylogger Fork
DarkComet RAT: Technical Analysis of Attack Chain
AZORult Malware: Technical Analysis
CyberGate Technical Analysis
How to analyze malicious macros in MS office documents
Gafgyt Backdoor Analysis
How to deobfuscate Javascript malware
CryptNet Ransomware Detailed Analysis
Matanbuchus Loader Detailed Analysis
How to setup ARM android virtual machine on x86 host machine
2023
Obfuscated Challenge Walkthrough
Deep Analysis of Vidar Stealer