A collection of detailed technical writeups covering CTF challenges, malware analysis, and reverse engineering projects.

Mar 01
2024
Malware Analysis Beginner

Analysis of a Simple Trojan Downloader

A walkthrough of analyzing a simple trojan downloader using static analysis techniques.

2 min read Malware Static Analysis Ghidra

What to Expect

Malware Analysis Reports

Detailed analysis of malware samples including:

  • Static analysis with Ghidra/IDA Pro
  • Dynamic analysis with x64dbg and sandboxes
  • Memory forensics with Volatility
  • IOC extraction and YARA rules

CTF Writeups

Solutions and learning notes from capture-the-flag competitions:

  • Binary exploitation
  • Reverse engineering challenges
  • Cryptography puzzles
  • Web security challenges

Reverse Engineering

Deep dives into software internals:

  • Protocol analysis
  • Game modding
  • Software protection analysis
  • Binary patching techniques
Disclaimer:

All malware analysis is performed in isolated environments for educational and research purposes. Never execute suspicious files on production systems.