Posts by Tag
Writeup
Aeternum Loader: Exploring a blockchain C2 botnet
Combination of reversing polygon smart contract encryption and performing malware analysis on the initial loader.
Reverse engineering canary tokens to reveal the callback tripwire.
Explores how Canarytokens leverage Authenticode certificates to embed an OCSP/CRL callback beacon.
KoiStealer Analysis: Initial loader to credential exfiltration
KoiStealer is a info-stealer malware delivered via phishing campaigns, designed to exfiltrate browser credentials and...
Unpacking brbbot: Dissecting a persistent, covert botnet malware.
Analysis of the 'brbbot' botnet malware that allows attackers access to infected systems through C2 communication.
PicoCTF: Picker I/II/III/IV {Medium} {Reverse engineering & Binary exploit}
Walkthrough for the Picker I/II/III/IV series that consist of three reverse engineering and one binary exploit challe...
PicoCTF: Who are you? {Medium} {Web exploitation}
Writeup for the picoCTF Who are you? challenge in the web exploit category.
Malware
Aeternum Loader: Exploring a blockchain C2 botnet
Combination of reversing polygon smart contract encryption and performing malware analysis on the initial loader.
KoiStealer Analysis: Initial loader to credential exfiltration
KoiStealer is a info-stealer malware delivered via phishing campaigns, designed to exfiltrate browser credentials and...
Unpacking brbbot: Dissecting a persistent, covert botnet malware.
Analysis of the 'brbbot' botnet malware that allows attackers access to infected systems through C2 communication.
CTF
PicoCTF: Picker I/II/III/IV {Medium} {Reverse engineering & Binary exploit}
Walkthrough for the Picker I/II/III/IV series that consist of three reverse engineering and one binary exploit challe...
PicoCTF: Who are you? {Medium} {Web exploitation}
Writeup for the picoCTF Who are you? challenge in the web exploit category.