Archive Show All19 APK1 Cheatsheet4 DFIR4 Malicious-Document1 Malware11 Reverse-Engineering7 Writeup6 2024 Jul 13Dive into PEB Walk in Malware Analysis Jun 01Determine and understand hashing algorithms for Malware Analysis Apr 20Cheatsheet: Malicious Document Analysis Mar 29Cheatsheet: Linux Forensics Analysis 2023 Dec 22Cheatsheet: Windows Forensics Analysis 2022 Dec 23Yet another Malicious Android Apps targeting Malaysian Nov 20Building Offensive Malicious Documents Aug 08Cheatsheet: Windows Malware Analysis and Reversing Jan 20UPX manual unpack: ELF and EXE 2021 Sep 20Malware 101: Develop and Analyze our own malware May 11Powershell 101 in Malware Analysis Feb 06Lemon-Duck Powershell: An easy way to deobfuscate it! 2020 Jun 26Writeup: FIRST 2020 CTF Challenge May 28Writeup: Cynet Incident Response Challenge 2019 Dec 07Build Malicious CHM (Help) file May 03Writeup: F-Secure 2019 Qualification and Semi Final Apr 02Writeup: Backdoor CTF Practice Arena Reversing Challenge 2018 Dec 31Writeup: CipherText CTF 2018 Reverse Engineering Challenges Dec 31Writeup: UiTM iHack 2018 Qualification Reverse and Pwn Challenges