Posts by Category

Malware Analysis

Analysis of Nova: A Snake Keylogger Fork

Check out my Technical Analysis of Nova KeyLogger on ANY.RUN

DarkComet RAT: Technical Analysis of Attack Chain

Check out my detailed analysis of DarkComet RAT on ANY.RUN

AZORult Malware: Technical Analysis

Check out my Technical Analysis of AZORult on ANY.RUN

CyberGate Technical Analysis

Check out my detailed analysis of the CyberGate on Cyber5W

How to analyze malicious macros in MS office documents

Check out my detailed analysis of the malicious macros in MS office documents on Cyber5W

Gafgyt Backdoor Analysis

Check out my detailed analysis of the Gafgyt Backdoor on Cyber5W

How to deobfuscate Javascript malwares

Check out my detailed analysis of deobfuscated Javascript malwares on Cyber5W

CryptNet Ransomware Detailed Analysis

Check out my detailed analysis of the CryptNet Ransomware on Cyber5W

Matanbuchus Loader Detailed Analysis

Check out my detailed analysis of the Matanbuchus Loader on Cyber5W

Detect Mortis Locker Ransomware With YARA Rule

Mortis Locker YARA Rule

Obfuscated Challenge Walkthrough

Malware Analysis Challenge from Cyber Defenders - Difficulty: Medium

Deep Analysis of Vidar Stealer

Vidar Stealer Technical Analysis

Back to Top ↑

Tutorials

Back to Top ↑