PinnedIdentifying Malicious Activity Using WinAPIsThe provided write-up covers various techniques that malware authors may use to inject malicious code into processes, manipulate system…Jan 24, 2024Jan 24, 2024
PinnedPublished inInfoSec Write-upsShellcode AnalysisLet’s see what shellcodes are and how we can Identify and Analyze them.Apr 29, 20222Apr 29, 20222
PinnedPublished inBetter ProgrammingAnalysis of Compiled Python FilesLet’s see how a Python script works under the hoodDec 7, 20211Dec 7, 20211