0x80How to Manually Unpack a BinaryThe binary used for analysis in this post is from a hackthebox challenge called exatlon. I will not be solving the challenge in this post…Jul 7, 2022Jul 7, 2022
0x80Cyber Apocalypse CTF 2022 — Golden PersistenceThis was my favorite forensics challenge from the ctf. I have never analyzed windows registry key data before so this was really exciting…May 21, 2022May 21, 2022
0x80Cyber Apocalypse CTF 2022 — PuppeteerThis is my write-up for puppeteer, a forensics challenge from the Cyber Apocalypse CTF 2022.May 21, 2022May 21, 2022
0x80Mirai Source Code — OverviewAs I laid out in my introduction to how I was going to go about analyzing the Mirai botnet’s source files, I felt it best to look at the…May 14, 2022May 14, 2022
0x80Deep Static Analysis of Mirai BotnetWelcome to my attempt at a deep static analysis of the Mirai botnet source code. This blog stands to server as a running journal of my…May 12, 2022May 12, 2022