Max cheeinCSG @ GovTechUncommon office malware stagersThis article discusses the TTPs to deliver a simulated malware attack with a focus on uncommon Microsoft Office file formatsApr 4, 2022Apr 4, 2022
Max cheeinCSG @ GovTechEvaluating the security of password managers on handphone devicesA closer look at two password managers I tested and the vulnerabilities I discovered in their security design.Jan 6, 2021Jan 6, 2021
Max cheeinCSG @ GovTechZip me baby one more timeArticle explores novel mechanisms to bypass email gateways — with a focus on Zip files and its use in a simulated malware delivery mechanismSep 29, 2020Sep 29, 2020
Max cheeinCSG @ GovTechiOS Tampering Techniques Part 2 — Advanced run-time tampering on Swift applications using THEOSIn my previous article, I shared on how I bypassed jailbreak detection by using the THEOS tool to conduct run-time tampering on iOS. For…Jul 13, 2020Jul 13, 2020
Max cheeinCSG @ GovTechiOS Tampering Techniques Part 1 — Introduction to run-time tampering through THEOSBasics of run-time tamperingJul 2, 2020Jul 2, 2020