Recent posts
RansomeWare Investigation
Forensic Analysis for Disk & Memory Dumped from an infected computer ...
0xL4ugh CTF 2023
Writeup for 0xL4ugh Reverse challenges ...
ESXIArgs Ransomware Analysis
Detailed Analysis of ESXIArgs Ransomware...
Exploit Development
Explanition of various memory corruption vulnrabilities
OOP MAlware Analysis
Here I will explain how to analyze malware written with OOP...
Open Source SIEM Build
Building our own SIEM Solution using Open Source tools ...
Windows Persistence
Windows Persistence vectors explanation
Windows Privilege escalation
Windows Privilege escalation vectors explanation