CYBER 5W

CYBER 5W

The Art of DFIR Training

CryptNet Ransomware Detailed Analysis

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware

in
Matanbuchus Loader Detailed Analysis

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus loader

in
NTFS Artifacts Analysis

NTFS Artifacts Analysis

A reference for NTFS file system artifacts investigation

in
Setup a Pro Malware Analysis VM

Setup a Pro Malware Analysis VM

Explore tools that can make your life much easier

in
Chromium Based Browsers Investigation

Chromium Based Browsers Investigation

A reference for chromium based browsers investigation

in
Pikabot Loader Detailed Analysis

Pikabot Loader Detailed Analysis

Part 1 of the analysis for Pikabot malware 'Loader Analysis'

in
Memory Forensics - Practical Example, Detect Classic Remote Process Injection

Memory Forensics - Practical Example, Detect Classic Remote Process Injection

Practical Example, Detect Classic Remote Process Injection

in
Malware Analysis - How to Bypass Anti-Debugging Tricks - Part 1

Malware Analysis - How to Bypass Anti-Debugging Tricks - Part 1

How to Bypass Anti-Debugging Tricks - Part 1

in