Aziz FarghlyDissecting SnakeKeyLogger Macrosthis blog will discuss how SnakeKeyLogger uses Advpack.dll to drop and execute his main payload.Feb 7Feb 7
Aziz FarghlyStealc Stealer AnalysisIn detailed Analysis for the Stealc stealer.Nov 9, 2023Nov 9, 2023
Aziz FarghlyDeep Learning in Speech ProcessingBefore begging I want to thank Dr.Hany El-Nashar , my instructor for giving me the opportunity to navigate such a science.Sep 2, 2023Sep 2, 2023
Aziz FarghlySmoke Loader ShellCode AnalysisRevealing secrets of SMOKELOADER shellcodeMay 18, 20231May 18, 20231
Aziz FarghlyDomino Supply Chain AnalysisHello Geeks, I have decided to spend my time reading some reports and trying to do my own analysis to upgrade my threat intel skills so…Apr 24, 2023Apr 24, 2023
Aziz FarghlyMedusa Dectection via YaraIn this small article, i will explain how to write a Yara rule for Medusa RansomwareApr 13, 2023Apr 13, 2023
Aziz FarghlyDeath Ransomware Analysis_part1Hello Cyber Geeks, today I am going to explain how Death Ransom behavior is done and how the encryption method happens, and how to detect…Apr 2, 2023Apr 2, 2023