This article explores advanced static malware analysis techniques, including file format analysis, strings analysis, control flow graph reconstruction, disassembly and reverse engineering, signature-based detection, and indicators of compromise, providing practical examples and tool recommendations for professional hackers, pen testers, and red teamers.
This article provides an in-depth overview of advanced malware analysis techniques, including manual and automated disassembly, decompilers, debuggers, and dynamic binary instrumentation (DBI), with examples of tools and outputs provided for each technique.
To defeat the EDR, you must think like the EDR. This guide introduces malware analysis concepts specifically for Red Team operators to self-audit payloads and improve stealth.
A comprehensive deep-dive into the world of reverse engineering. Learn the fundamental concepts of disassembly and decompilation, master the nuances of PE and ELF file formats, understand x86/x64 assembly, and discover how to bypass anti-reverse engineering protections during advanced red team engagements.
A deep-dive into the hidden layer of microcode. Explore its architecture, the non-persistent update process, the cryptographic protections (and weaknesses) of vendor signatures, and the modern Microarchitectural attacks like Downfall and Zenbleed that have redefined hardware security.