Shreyash TambeCracking AgentTesla: Revealing Steganographic PayloadReversing .NET Executables and DLL PayloadsSep 5Sep 5
Shreyash TambeDetect Malicious Strings at Lightning Speed with PythonStreamline Your Malware Detection Process!Jul 22Jul 22
Shreyash TambeHunting in Cyberspace: Tracking Down Watering Hole Attacks.“Hey there, readers! Welcome back to my page — let’s dive right into the heart of our topic today!” #DON’T MISS THE END : ) 🚀Apr 29Apr 29
Shreyash TambeProcess Injection Series Part I: API calls used for Process InjectionUnpacking the Malware as a kid unpacking candies : )Feb 18Feb 18
Shreyash TambeBase64 Encoding and DecodingSafeguarding Data in the Digital RealmNov 7, 2023Nov 7, 2023
Shreyash TambeMastering Malware AnalysisExploring PE Header, Static and Dynamic Malware AnalysisOct 31, 2023Oct 31, 2023