2024
- 26 May CTF Challenge Walkthrough from Practical Binary Analysis
- 20 Mar Solving flare-on challenge using DBI
2023
- 14 Dec Luckbit Ransomware
- 11 Dec The Crime(Endpoint Forensics)
- 12 Nov GDB Python(pico CTF)
- 12 Nov CrimsonRAT
- 02 Nov Dridex Trojan(Stealer)
- 22 Oct Malwy(Shellcode Execution)
- 07 Oct Heaven's Gate Technique
- 17 Sep Insider(Endpoint Forensics)
- 29 Jul iloveyou Virus
- 18 Jul Packers and Unpacking(Chapter 18)
- 15 Jul Anti-Virtual Machine Techniques(Chapter 17)
- 11 Jul Anti-Debugging(Chapter 16)
- 08 Jul Anti-Disassembly(Chapter 15)
- 02 Jul Malware-Focused Network Signatures(Chapter 14)
- 23 Jun Data Encoding(Chapter 13)
- 06 Jun SeDebugPrivilege Escalation(Lab12-04)
- 25 May Process Replacement & Hook Injection
- 22 May DLL Injection (Lab12-01)
- 18 May Keylogger (Lab11-03)
- 17 May Process Injection Techniques
- 17 May Essential Keyboard Shortcuts
- 13 May Inline Hook (Lab11-02)
- 02 Apr GINA Interceptor(Lab 11-01)
- 25 Mar Unpacking Bokbot
- 06 Mar Backdoor(Lab 01-01)
- 21 Feb Malware Analysis Tools
- 21 Feb Malware Behavior
- 10 Jan Malware Static Analysis
- 03 Jan B1ll_Gat35
- 01 Jan Wizardlike