PinnedBarak AharoniIdentifying Malicious Activity Using WinAPIsThe provided write-up covers various techniques that malware authors may use to inject malicious code into processes, manipulate system…Jan 24Jan 24
PinnedBarak AharoniinInfoSec Write-upsShellcode AnalysisLet’s see what shellcodes are and how we can Identify and Analyze them.Apr 29, 20222Apr 29, 20222
PinnedBarak AharoniinBetter ProgrammingAnalysis of Compiled Python FilesLet’s see how a Python script works under the hoodDec 7, 20211Dec 7, 20211