Chicken0248[Blue Team Labs Online Write-up] NonyxPurify Black Energy 2 from Shadowbrook’s digital infrastructure by reverse-engineering the malware’s code.Nov 11
InSystem WeaknessbyChicken0248[Blue Team Labs OnlineWrite-up] MasqueradeOmar’s USB drive might be the cause of the breach; Your task is to analyze these artifacts and determine exactly what happened.Nov 11Nov 11
Chicken0248[TryHackMe Write-up] Memory ForensicsPerform memory forensics to find the flagsAug 17Aug 17
Chicken0248[Blue Team Labs Online Write-up] NonyxPurify Black Energy 2 from Shadowbrook’s digital infrastructure by reverse-engineering the malware’s code.Nov 11
InSystem WeaknessbyChicken0248[Blue Team Labs OnlineWrite-up] MasqueradeOmar’s USB drive might be the cause of the breach; Your task is to analyze these artifacts and determine exactly what happened.Nov 11
Dean“Step-by-Step Guide to Uncovering Threats with Volatility: A Beginner’s Memory Forensics…Alright, let’s dive into a straightforward guide to memory analysis using Volatility. Memory forensics is a vast field, but I’ll take you…Nov 1