12:44
Malware Simulators cannot test Antivirus Software
690 views • 2 days ago
30:44
Triaging Files on VirusTotal
1.7K views • 2 weeks ago
34:11
Malware Analysis - JS to PowerShell to XWorm with Binary Refinery
1.1K views • 1 month ago
13:26
Malware Theory - Five Unpacking Methods and a Generic Unpacking Approach
1.7K views • 1 month ago
5:30
Binary Ninja - Fix unresolved stack pointer
584 views • 2 months ago
40:05
Malware Analysis - Unpacking AutoIt stub with large obfuscated script
1.3K views • 3 months ago
27:09
Malware Analysis - C2 extractor for Turla's Kopiluwak using Binary Refinery
1.3K views • 3 months ago
43:08
Malware Analysis - 3 ways to deobfuscate JScript and JavaScript malware
1.6K views • 4 months ago
16:18
Malware Analysis - .NETReactor deobfuscation and configuration extraction of AgentTesla
1.4K views • 5 months ago
28:07
Malware Analysis - ZPAQ to .NET downloader to Injector DLL unpacking
1K views • 6 months ago
19:24
Hiding .NET IL code from DnSpy with R2R Stomping
1.3K views • 6 months ago
9:03
Reversing - .NET main is not the first thing executed
969 views • 6 months ago
4:47
Malware Analysis Course for Hedgehogs is out
3.2K views • 7 months ago
20:06
Malware Analysis - Agniane Stealer, Native Stub to .NET Unpacking
1.9K views • 8 months ago
4:13
Why Windows system files have wrong compile timestamps
1.3K views • 9 months ago
10:36
Malware Analysis - Unpacking Ageostealer built with Electron Framework
1.6K views • 10 months ago
9:57
Malware Theory - Packer identifiers don"t tell you if a file is packed
3.2K views • 1 year ago
45:37
Malware Analysis - 3CX SmoothOperator C2 extraction with x64dbg and CyberChef
1.3K views • 1 year ago
9:22
Malware Analysis - 3CX SmoothOperator Authenticode Abuse
1K views • 1 year ago
37:03
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja
2.6K views • 1 year ago
14:00
Malware Theory - How Packers Work, Polymorphism and Misconceptions
4.8K views • 1 year ago
14:57
Does Writing Malware Help With Malware Analysis?
3.3K views • 1 year ago
28:20
Malware Analysis - Decrypt NighHawk Strings with Ghidra Scripting
3.2K views • 1 year ago
26:47
Malware Analysis - Ghidra vs Cutter vs Binary Ninja vs IDA Free
15K views • 1 year ago
17:24
Malware Analysis - Kernel Mode Driver Emulation with Speakeasy
3.1K views • 1 year ago
37:28
Malware Analysis - Hybrid Analysis for Malware Assessment
4.7K views • 1 year ago
14:54
Book Review - Malware Analysis and Detection Engineering
4K views • 1 year ago
11:32
Malware Theory - Overview to Malware Vaccines
3.1K views • 2 years ago
21:06
Reversing - Writing an EXE4J Configuration Extractor
2.1K views • 2 years ago
8:33
Malware Theory - Trojan Horse is not a Malware Type
4.4K views • 2 years ago
Load More