Malware Analysis


About the Malware Analysis category (1)
Update: base64dump.py Version 0.0.10 (1)
Stack Buffer Overflows - a primer on smashing the stack using CVE-2017-11882 (1)
A simple unpacker of a simple PE packer (shrinkwrap) (1)
Deobfucsating xor’ed strings (1)
[Notes] Possibly PowerRatankba Chm file (1)
RIG EK via Ngay drops Smokeloader -> XMR Miner (1)
The Big Zeus Family Similarity Showdown v2 (1)
Ransomware Simulation (1)
Kerberoasting, exploiting unpatched systems – a day in the life of a Red Teamer (1)
Video: SpiderMonkey Output Options (1)
Unpacking Gootkit Part 2 - Debugging Anti-Analysis Tricks With IDA Pro and x64dbg (1)
Malware on Google Play Targets North Korean Defectors (1)
The Many Faces of Ursnif - Email Hijacking, Mailslots, and Insecure Servers (1)
PuffStealer – Evasion in a Cloak of Multiple Layers (1)
TeleGrab - Grizzly Attacks on Secure Messaging (1)
Building up from the Ethereum Bytecode (1)
A Quick Look At A Malicious Script (1)
CS7038-Malware-Analysis Course Repository for University of Cincinnati (1)
Getting ready for Assembly Language Programming – Part 1 (1)
Getting ready for Assembly Language Programming – Anatomy of Intel Processor (1)
Ground Zero: Part 3 – Reverse Engineering Basics – Linux on ARM64 (1)
Ground Zero: Part 2-2 – Reverse Engineering – XOR encryption – Windows x64 (1)
A Deep Dive Into RIG Exploit Kit Delivering Grobios Trojan (1)
Reverse Engineering For Beginners – XOR encryption – Windows x64 (1)
Malware Analysis – PlugX – Part 2 (1)
Update: base64dump.py Version 0.0.9 (1)
PSCrypt ransomware: back in business (1)
Update: oledump.py Version 0.0.34 (1)
Malware Theory - Oligomorphic, Polymorphic and Metamorphic Viruses (1)