StealC Malware Analysis Part 1
StealC Malware Analysis Part 2
StealC Malware Analysis Part 3
Jupiter X Core Plugin <= 4.6.5 Remote Code Execution (CVE-2024-7772)
Jupiter X Core Plugin <= 4.7.5 Authentication Bypass (CVE-2024-7781)
Writing a stealer logs parser
XORtigate: Pre-authentication Remote Code Execution on Fortigate VPN (CVE-2023-27997)
CVE-2023-27997 - Forensics short notice for XORtigate
Sshimpanzee
Cobalt Strike Investigation - Part 2
Cobalt Strike Investigation Part 1
Obfuscated obfuscation
AvosLocker Ransomware Linux Version Analysis
DanaBot Communications Update
Dridex Loader Analysis
Lockbit analysis
Pentesting a banking FTP service
Whitepaper: The Lazarus Constellation - A study on North-Korean malware
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 3/4)
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 2/4)
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 1/4)
Visit also our blog dedicated to web security research