Michael ReedMalware Analysis Lab Creation (Part 1)Welcome to an introduction on how to create a malware analysis lab!1d ago
Linda MargaretinBrain LabsConsidering a Career in Cybersecurity? Watch Battlestar Galactica First.Why will the series prepare you for the science and then some?Sep 188
Sohail SahaVoidgate: how to execute shellcode while keeping it encryptedVoidgate evades AV/EDRs by decrypting and executing only one instruction of encrypted shellcode at a time, before re-encrypting it back.Sep 28Sep 28
Chicken0248inSystem Weakness[CyberDefenders Write-up] UnPackMeCategory: Malware Analysis23h ago23h ago
Linda MargaretinBrain LabsWhen Malware Packs a Human FormDisrupting path dependency online & off in humans & machinesMar 84Mar 84
Michael ReedMalware Analysis Lab Creation (Part 1)Welcome to an introduction on how to create a malware analysis lab!1d ago
Linda MargaretinBrain LabsConsidering a Career in Cybersecurity? Watch Battlestar Galactica First.Why will the series prepare you for the science and then some?Sep 188
Sohail SahaVoidgate: how to execute shellcode while keeping it encryptedVoidgate evades AV/EDRs by decrypting and executing only one instruction of encrypted shellcode at a time, before re-encrypting it back.Sep 28
Linda MargaretinBrain LabsWhen Malware Packs a Human FormDisrupting path dependency online & off in humans & machinesMar 84
Mustapha Ait IchouRetracted TryhackmeHello, I hope you are doing well. Thank you for taking the time to read my blog about solving the Retracted Room on TryHackMe. It focuses…Aug 10
Michael ReedMalware Analysis Lab Creation (Part 3)The final part in the malware analysis lab creation series!1d ago
Jean-Pierre LESUEUR (Microsoft MVP)inPhrozenA Malware retrospective: SubSevenIn our “Malware Retrospective” series, we delve into the captivating history of SubSeven, a landmark Remote Access TrojanJul 18, 20233