Skip to main content

Malware Analysis

Advanced Malware Analysis: Static Analysis Techniques

··1333 words·7 mins· loading · loading
This article explores advanced static malware analysis techniques, including file format analysis, strings analysis, control flow graph reconstruction, disassembly and reverse engineering, signature-based detection, and indicators of compromise, providing practical examples and tool recommendations for professional hackers, pen testers, and red teamers.

Advanced Malware Analysis: Disassembly Techniques

··3984 words·19 mins· loading · loading
This article provides an in-depth overview of advanced malware analysis techniques, including manual and automated disassembly, decompilers, debuggers, and dynamic binary instrumentation (DBI), with examples of tools and outputs provided for each technique.

Dynamic Techniques for Advanced Malware Analysis

··2231 words·11 mins· loading · loading
This article discusses advanced malware analysis techniques focusing on dynamic analysis and provides real-world examples and code samples for techniques such as memory analysis, network monitoring, and debugging.

Anti-Forensics: Knowing What They See (Memory Analysis)

··587 words·3 mins· loading · loading
To hide in memory, you must study memory. This guide flips the script on forensics, using Volatility to understand how Blue Teams hunt for your beacons.

Know Thy Enemy: Malware Analysis for Red Teams

··693 words·4 mins· loading · loading
To defeat the EDR, you must think like the EDR. This guide introduces malware analysis concepts specifically for Red Team operators to self-audit payloads and improve stealth.