Archives
- 11 Apr Reversing a Custom Cipher to Extract Quasar RAT: From Raw Disassembly to Decrypted C2 Config
- 10 Apr DcRAT in 48KB: Cracking the Config, Mapping the Plugin Loader, and Why the Stub IS the Malware
- 09 Apr Cracking a .NET Crypter to Extract a Weaponized XWorm: Bootkit, Rootkit, and a Zero-Day UAC Bypass
- 08 Apr Backdoor.Win64.Gsb: A Go Implant Hiding Behind Nuclear Reactor Simulations
- 07 Apr njRAT v0.7d 'HacKed' Campaign: Config Extraction, C2 Protocol, and Full Capability Mapping
- 06 Apr Pulsar RAT .NET Reversing: C2 Protocol Recovery, Costura Extraction, and DPAPI Credential Theft Pipeline
- 06 Mar Kaiji-Like Linux ELF Reversing: Persistence, C2 Token Recovery, and Ares Module Mapping
- 25 Feb Mirai-like ELF Reversing, Part I: Stage1 Trust Gate, Command Dispatch, and Killer Loop
- 23 Feb Stage1 (22.exe) Loader Reversing, Part I: Stage Decryption, Evasion, and Attribution
- 20 Feb From log.dll To A Decrypted Chrysalis Main Module