Phantom Code: Unleashing Memory Bombing to Bypass Security Mechanisms


ESET Wiper: Iranian APT Group Toufan’s
Politically Motivated Attack on Israeli Firms

Dissecting Agent Tesla: Unveiling Threat Vectors and Defense Mechanisms


Revealing the Abyss Ransomware


Investigating Token Impersonation and
Mitigating Token Theft Risks


BiBi Wiper:
A Malware Analysis Amidst the
Israel-Hamas-ISIS Conflict


Unmasking RedLine Stealer


Macro Code in Word, Safe or Not?


picoCTF
‘unpackme-upx’ Reverse Engineering


Unquoted Service Path Vulnerability
MiniTool ShadowMaker v12.7


Stremio 4.4
Application Directory DLL Planting


The Kerberoasting Attack


Exploiting XXE to retrieve files


How I earned 200$ in Bug Bounty


Buffer Overflow Explained


SAM and SYSTEM Registry Keys



Cronos — HackTheBox WriteUp


Steganography — Hiding data in an image



RDP – Brute Force Attack


How to Generate an Evil QR Code
with Excel Sheets

Keep Posted with the Latest Research Articles