Malware & Threat Intelligence Researcher exploring malware, APT groups, and their campaigns across the wild.
Detailed analysis of CyberGate, published on Cyber5W blog
Detailed analysis of malicious macros in MS office documents, published on Cyber5W blog
Detailed analysis of Gafgyt Backdoor, published on Cyber5W blog
Tutorial on deobfuscating JavaScript malware, published on the Cyber5W blog
Detailed analysis of CryptNet Ransomware, published on Cyber5W blog
Detailed analysis of Matanbuchus Loader, published on Cyber5W blog
Setup ARM android virtual machine on x86 host machine tutorial
Malware Analysis Challenge from Cyber Defenders