Posts by Tag
Writeup
CanaryTokens: Reverse engineering .exe CanaryTokens to reveal the callback tripwire.
Explores how Canarytokens leverage Authenticode certificates to embed an OCSP/CRL callback beacon.
KoiStealer Analysis: Initial loader to credential exfiltration
KoiStealer is a info-stealer malware delivered via phishing campaigns, designed to exfiltrate browser credentials and...
Unpacking brbbot: Dissecting a persistent, covert botnet malware.
Analysis of the 'brbbot' botnet malware that allows attackers access to infected systems through C2 communication.
PicoCTF: Picker I/II/III/IV {Medium} {Reverse engineering & Binary exploit}
Walkthrough for the Picker I/II/III/IV series that consist of three reverse engineering and one binary exploit challe...
PicoCTF: Who are you? {Medium} {Web exploitation}
Writeup for the picoCTF Who are you? challenge in the web exploit category.
CTF
PicoCTF: Picker I/II/III/IV {Medium} {Reverse engineering & Binary exploit}
Walkthrough for the Picker I/II/III/IV series that consist of three reverse engineering and one binary exploit challe...
PicoCTF: Who are you? {Medium} {Web exploitation}
Writeup for the picoCTF Who are you? challenge in the web exploit category.
Malware
KoiStealer Analysis: Initial loader to credential exfiltration
KoiStealer is a info-stealer malware delivered via phishing campaigns, designed to exfiltrate browser credentials and...
Unpacking brbbot: Dissecting a persistent, covert botnet malware.
Analysis of the 'brbbot' botnet malware that allows attackers access to infected systems through C2 communication.