Archive Show All15 APK1 DFIR2 Malicious-Document1 Malware9 Reverse-Engineering6 Writeup6 2024 Jul 13Dive into PEB Walk in Malware Analysis Jun 01Determine and understand hashing algorithms for Malware Analysis 2022 Dec 23Yet another Malicious Android Apps targeting Malaysian Nov 20Building Offensive Malicious Documents Jan 20UPX manual unpack: ELF and EXE 2021 Sep 20Malware 101: Develop and Analyze our own malware May 11Powershell 101 in Malware Analysis Feb 06Lemon-Duck Powershell: An easy way to deobfuscate it! 2020 Jun 26Writeup: FIRST 2020 CTF Challenge May 28Writeup: Cynet Incident Response Challenge 2019 Dec 07Build Malicious CHM (Help) file May 03Writeup: F-Secure 2019 Qualification and Semi Final Apr 02Writeup: Backdoor CTF Practice Arena Reversing Challenge 2018 Dec 31Writeup: CipherText CTF 2018 Reverse Engineering Challenges Dec 31Writeup: UiTM iHack 2018 Qualification Reverse and Pwn Challenges