Security Research Publications

BSides Las Vegas – Malware Analysis – Red Team Edition

Antivirus Bypass Techniques

Hunting Process Injection by Windows API Calls

YouTube Channel

LockBit 3.0 Ransomware Analysis – Malware for Fun

Red Team – Supply Chain Edition

Understanding Follina (CVE-2022-30190) – Malware for Fun

Yashma Ransomware Builder Analysis – Malware for Fun

Ardamax Keylogger Part 3 – Malware for Fun

Ardamax Keylogger Part 2 (Dropper) – Malware for Fun

Ardamax Keylogger Part 1 (Overview) – Malware for Fun

DarkSide Ransomware Reverse Engineering

Malware Analysis – Unpacking ASPack Manually

Malware Analysis – Unpacking PECompact Manually

Malware Analysis – Unpacking UPX Manually

Malware Analysis – Mirai Botnet Huawei Exploit

Ursnif Banking Trojan Malware Analysis

Malware Analysis – Unpacking ZIP Packed Malware without Infecting your System

Security Research – YouTube

One Electron to Rule Them All PoC Demo

RDP Credentials Hijacking – Abusing KeyMgr.dll

Windows Defender Antivirus Bypass PoC

Malware Analysis Workshop – Dissecting the WannaCry Ransomware

Research Papers

FluBot – Android Malware Analysis

Dapato-Zusy Malware Analysis

Agent Tesla Loader – Malware Analysis

Keeping Up with the Emotets: Tracking a Multi-Infrastructure Botnet

IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines


One Electron to Rule Them All

Microsoft WslService Unquoted Service Path

Vitallia Trojan Returns to the Castle –

Intel® Audio Driver Unquoted Service Path Vulnerability

Can Document Files Be Trusted?

MSI TrueColor Unquoted Service Path Vulnerability

Corona-virus-Map Malware Analysis

Dissecting Ardamax Keylogger

InstallCore Obfuscation Analysis

PremierOpinion Spyware Analysis

The Malware Shlayer