Deobfuscating PowerShell Malware DroppersI recently saw a video of Ahmed S Kasmani dissecting a ComRAT PowerShell script to obtain the main malware that it drops onto the victim’s…Sep 26, 2021Sep 26, 2021
Pulling Bits From ROM Silicon Die Images: Unknown ArchitectureMy journey into Integrated Reverse Engineering didn’t begin too long ago but once I invested the time and understanding, I became…Mar 21, 20213Mar 21, 20213
Genetic Analysis of CryptoWall RansomwareA strain of a Crowti ransomware emerged, the variant known as CryptoWall, was spotted by researchers in early 2013. Ransomware by nature…Nov 23, 20201Nov 23, 20201
Using Z3 Theorem on AVR FirmwareAs many of you may or may not be aware of, I have a serious obsession with embedded systems security. It wasn’t until about two years ago…May 26, 20201May 26, 20201
Extracting Embedded Payloads From MalwareOne of my all time favorite subfields of reverse engineering is the dissection of viruses. In this article I will be exploring malware…Mar 3, 20201Mar 3, 20201
Reverse Engineering Encrypted Code SegmentsWhile working on a reverse engineering project, I came across a binary that appeared to be malformed since it couldn’t disassembled, but…Jan 3, 20202Jan 3, 20202