Published inInfoSec Write-upsWhat’s the Secret? Unpacking Command-Line Argument ManipulationAdversaries continually evolve their tactics to evade security defenses, and command-line argument spoofing is a particularly stealthy…Feb 10Feb 10
Published inInfoSec Write-upsReading Between the Lines of Code: Ziraat_StealerHello Everybody! Today i will be conducting an analysis of a .NET information stealer.Apr 29, 20241Apr 29, 20241
Published inInfoSec Write-upsTypo Trouble: Exploring the Telegram Python RCE VulnerabilityTelegram’s Windows application was recently updated to address a critical zero-day flaw that permitted the execution of Python scripts…Apr 20, 2024Apr 20, 2024
Published inInfoSec Write-upsMy Journey with CRTO: A ReviewI’m excited to announce my recent achievement: successfully passing the Red Team Operator (RTO) exam offered by Zero Point Security. This…Apr 11, 2024Apr 11, 2024
Published inInfoSec Write-upsWindows Security: Using AMSI to Analyze Malicious JavaScriptAMSI : Anti-Malware Scan InterfaceFeb 21, 2024Feb 21, 2024
Published inInfoSec Write-upsThe Ping of Death: How ICMP Packets Can Be Used for Data Ex-filtrationSuppose you are a system administrator for a big business and you just found out that a third party has obtained some of your confidential…Feb 1, 2024Feb 1, 2024
Published inInfoSec Write-upsCode caving attacks: How Hackers Stitch Together CodeCode caving attacks usually exploit unused memory areas in legitimate programs, by concealing malicious code with sophistication. This form…Jan 12, 2024Jan 12, 2024
Published inInfoSec Write-upsThe Art of Obfuscation: Evading Static Malware DetectionDec 25, 2023Dec 25, 2023
Published inInfoSec Write-upsUnmasking NJRAT: A Deep Dive into a Notorious Remote Access Trojan Part2In the first part of this blog series, we discussed how the malware NjRAT is built , its capabilities and more.In this blog we will…Nov 26, 2023Nov 26, 2023