Dynamic Techniques for Advanced Malware Analysis

This article discusses advanced malware analysis techniques focusing on dynamic analysis and provides real-world examples and code samples for techniques such as memory analysis, network monitoring, and debugging.

April 11, 2023 · 8 min · UncleSp1d3r

Covenant: Mastering Red Teaming Tactics

This article provides a comprehensive guide to using Covenant, a powerful command and control framework for red teaming and post-exploitation operations, covering its architecture, installation, setup, usage, real-world examples, and custom task development for a technical audience.

April 8, 2023 · 7 min · UncleSp1d3r

IoT Device Hacking: Techniques and Practical Examples

This article provides a comprehensive overview of hacking techniques and real-world examples for exploiting vulnerabilities in IoT devices, including code samples and tool recommendations, intended for a technical audience of red teams and pen testers.

April 7, 2023 · 13 min · UncleSp1d3r