You are here |
malwaretech.com | ||
| | | |
goggleheadedhacker.com
|
|
| | | | Learn how to reverse engineer golang malware using Radare2. This article will explain how the gopclntab works and how we can use it to extract function names. This process is explained using the Robbinhood Ransomware that attacked Baltimore. | |
| | | |
intezer.com
|
|
| | | | This deep dive aims to guide you through .NET reverse engineering, equipping you with the essential knowledge to analyze .NET malware. | |
| | | |
syprog.blogspot.com
|
|
| | | | Source code for this article may be found here . The problem of software security has already been raised in my previous articles more ... | |
| | | |
blog.sicuranext.com
|
|
| | A new cyber-criminal group known as Hunt3r Kill3rs has recently emerged, claiming responsibility for a series of attacks on critical infrastructure with the final political goal of attacking Israeli companies and Israeli allies. This group has primarily focused on industrial control systems (ICS), communication networks, and vulnerable web applications. Their |