Travis Mathison
Malware Reverse Engineering and Threat Research.
HOME
CATEGORIES
TAGS
RESOURCES
REFERENCES
SCRIPTS
ARCHIVES
ABOUT
Home
Tags
Tags
Cancel
Tags
afxwinmain
1
arm
1
assembly
8
autoit
1
beavertail
1
blackcat
1
botnet
1
c++
1
crypto
2
ctf
2
danabot
1
darkgate
1
debugging
6
decoding
1
decryption
1
ebury
1
egghunter
1
elf
1
emotet
3
enumeration
1
excel
1
exploit-development
7
ficker
1
fickle
1
flarevm
1
fooder
1
ghidra
5
golang
1
hacking
13
hermes
1
hive
1
iat
1
ida
18
infostealer
1
invisibleferret
1
javascript
1
kernel32.dll
1
kimwolf
1
linux
1
macbook-pro
1
macros
1
malware
17
memory
3
mfc
1
msi
1
muddywater
1
MuddyWater
2
ntdll.dll
1
obfuscation
2
offensive-security
2
osce
1
oscp
1
p2pinfect
1
packers
2
penetration-testing
11
phishing
1
plugins
1
ransomware
1
rc4
2
report
2
rust
2
rustybuer
1
script
1
scripts
2
seylaran
1
shellcode
7
slae32
7
stack
1
stl
1
strings
1
struct
1
syscall
1
techniques
3
tips-and-tricks
5
UNC3313
1
UNC5667
1
walkthrough
2
widechar
1
windows
1
x86
7
Recently Updated
Wide string decoding
MuddyWater Malware Loader drops LightPhoenix
Seylaran Information Stealer malware
Kimwolf botnet
MuddyWater Fooder Malware
Trending Tags
ida
malware
hacking
penetration-testing
assembly
exploit-development
shellcode
slae32
x86
debugging
Trending Tags
ida
malware
hacking
penetration-testing
assembly
exploit-development
shellcode
slae32
x86
debugging
×
A new version of content is available.
Update