Nothing but dotnet when we shoot
Little talk about dotnet and its use in malware
Little talk about dotnet and its use in malware
WriteUp of the satan challenge from Barbhack 2022
Write up about the packer used by multiple threat actors during the past few months
Unpacking IcedID in order to extract the C2 domain name
A comprehensive Ryuk threat analysis
A simple naming pattern search on DPRK-linked infrastructure — and one domain that kept giving.
How a suspicious filename led to 88 phishing domains, a shared hosting cluster, and an operator who probably should have used a different email address.
War is reshaping Iran’s cyber operations. IRGC fragmentation, a near-total internet shutdown, and the loss of senior commanders are creating compounded uncer...
Cybercriminals and nation-state actors are converging on the same TTPs—not because they collaborate, but because efficiency is universal. They’re all playing...
How Turla tries to avoid attribution
Write up about the packer used by multiple threat actors during the past few months
To what point is attribution useful ?
A comprehensive Ryuk threat analysis
How a suspicious filename led to 88 phishing domains, a shared hosting cluster, and an operator who probably should have used a different email address.
War is reshaping Iran’s cyber operations. IRGC fragmentation, a near-total internet shutdown, and the loss of senior commanders are creating compounded uncer...
Cybercriminals and nation-state actors are converging on the same TTPs—not because they collaborate, but because efficiency is universal. They’re all playing...
Little talk about dotnet and its use in malware
WriteUp of the satan challenge from Barbhack 2022
SharkyCTF is a CTF organized during Sat, 09 May 2020 — Sun, 10 May 2020 . I participated with my CTF Team T-Regex and I was able to solve some challenges in ...
War is reshaping Iran’s cyber operations. IRGC fragmentation, a near-total internet shutdown, and the loss of senior commanders are creating compounded uncer...
SharkyCTF is a CTF organized during Sat, 09 May 2020 — Sun, 10 May 2020 . I participated with my CTF Team T-Regex and I was able to solve some challenges in ...
SharkyCTF is a CTF organized during Sat, 09 May 2020 — Sun, 10 May 2020 . I participated with my CTF Team T-Regex and I was able to solve some challenges in ...
Analysis of a custom malware loader
How a suspicious filename led to 88 phishing domains, a shared hosting cluster, and an operator who probably should have used a different email address.
How a suspicious filename led to 88 phishing domains, a shared hosting cluster, and an operator who probably should have used a different email address.
A simple naming pattern search on DPRK-linked infrastructure — and one domain that kept giving.