top of page

Search


Malware Development - Creating a Covert Spyware (Loader & Main Payload) in C
In this post, I’ll walk you through the detailed process of creating a covert spyware program for red teaming purposes. This project...


Micropsia: In-Depth Analysis of a Hamas-Linked Cyber Warfare RAT
Introduction Micropsia is a Remote Access Trojan (RAT) attributed to the AridViper threat actor group, which is closely linked to Hamas...


Karkoff: Static & Dynamic Analysis of an Iranian Trojan
Introduction Karkoff RAT is a sophisticated Remote Access Trojan that has recently garnered attention for its stealth and persistence....


Advanced Static Analysis - Reverse Shell
In this post, I will be presenting an advanced static analysis of a reverse shell malware downloaded from the HuskyHacks GitHub page This...


Basic Static & Dynamic Analysis - SillyPutty
This post will be showing you my analysis of the "Putty.exe" file downloaded from the HuskyHacks GitHub page. This is the information I...


Analyzing A Reverse Shell
In this post, I am going to analyze another RAT downloaded from the HuskyHacks GitHub page. This is the information I have on the file...


Dynamic Analysis - An Unknown RAT
In this post, I am going to analyze a RAT downloaded from the HuskyHacks GitHub page. This is the information I have on the file before...


TryHackMe - MAL: REMnux - The Redux
In this post, we will learn about REMnux, a Linux toolkit for reverse engineering. As this room is based on more advanced subjects, you...


TryHackMe - MAL: Strings
This time, we will solve the TryHackMe MAL: Strings room in the Cyber Defense path; this is the third room in the Malware Analysis...


TryHackMe - MAL: Malware Introductory Room
In this post, we're going to solve the TryHackMe Malware Introductory room in the Cyber Defense path, this is the second room in the...
bottom of page
