Write up about the packer used by multiple threat actors during the past few months
Posts by Category
To what point is attribution useful ?
Unpacking IcedID in order to extract the C2 domain name
How Homograph attacks are done using Unicode
A comprehensive Ryuk threat analysis
SharkyCTF is a CTF organized during Sat, 09 May 2020 — Sun, 10 May 2020 . I participated with my CTF Team T-Regex and I was able to solve some challenges in ...
Analysis of a custom malware loader