10 posts tagged

Reverse-Engineering

CyberGate Technical Analysis

CyberGate Technical Analysis

Analysis of CyberGate RAT

in
Writing YARA Rules

Writing YARA Rules

How to write a good YARA Rule

in
 Unpacking Malware Manually

 Unpacking Malware Manually

A Walkthrough of one of the most used unpacking techniques

in
Analyzing Macro enabled Office Documents

Analyzing Macro enabled Office Documents

Learn how to analyze MS Office Macro enabled Documents, a step-by-step guide to identifying and reversing malicious macros, and how to use olevba and cyberchef to decode and analyze the macro code. Analyzing Macro enabled Office Documents, a comprehensive guide to malware analysis, reverse engineering, and forensic investigations.

in
Gafgyt Backdoor Analysis

Gafgyt Backdoor Analysis

Analysis of Gafgyt Backdoor

in
How to analyze JavaScript obfuscation

How to analyze JavaScript obfuscation

Analysis of some famous JS obfuscation techniques

in
CryptNet Ransomware Detailed Analysis

CryptNet Ransomware Detailed Analysis

Detailed analysis of CryptNet Ransomware

in
Matanbuchus Loader Detailed Analysis

Matanbuchus Loader Detailed Analysis

Detailed analysis of Matanbuchus loader

in
Setup a Pro Malware Analysis VM

Setup a Pro Malware Analysis VM

Explore tools that can make your life much easier

in
Pikabot Loader Detailed Analysis

Pikabot Loader Detailed Analysis

Part 1 of the analysis for Pikabot malware 'Loader Analysis'

in