Idan MalihiDissecting Agent Tesla: Unveiling Threat Vectors and Defense MechanismsExecutive SummaryJul 14Jul 14
Idan MalihiInvestigating Token Impersonation and Mitigating Token Theft RisksExecutive SummaryJun 4Jun 4
Idan MalihiBiBi Wiper: A Malware Analysis Amidst the Israel-Hamas-ISIS ConflictExecutive SummaryDec 5, 2023Dec 5, 2023
Idan MalihiUnquoted Service Path Vulnerability — MiniTool ShadowMaker v12.7IntroductionJul 24, 2023Jul 24, 2023
Idan MalihiExploiting XXE to retrieve filesHello, welcome to my new article, this article will talk about a vulnerability called XXE - XML external entity injection. First, let me…Feb 25, 2023Feb 25, 2023
Idan MalihiHow I earned 200$ in Bug Bounty ProgramHello, welcome to my new article, this article will talk about how I earned 200$ in Bug Bounty Program. First, let me introduce my self, I…Jul 9, 202211Jul 9, 202211
Idan MalihiBuffer Overflow ExplainedHello everyone and welcome to my article about Buffer Overflow! Let me introduce my self, I am Idan and I am a penetration tester / red…Dec 24, 2021Dec 24, 2021