Posts by Category
- DFIR 5
- Memory Forensics 2
- CTF Write_up 2
- Reverse Engineering 1
- DIGITAL FORENSICS 1
- WalkThrough 1
- CyberDefenders 1
- Memory analysis 1
- Svchost Analysis 1
DFIR
May svchosts guid you
Malware can use hidden scaduald tasks to be persistent on your system and evade your defences. If you want to know ho...
DeepDive
DeepDive Memory Challenge from CyberDefenders. Solved By Labib from CTFCREATORS.
VOL404
we need an advanced memory forensics investigator, we were under attack, and tried to take a memory dump from the mac...
Dive DEEEEP
the plain is very easy and straightforward, jump to the kernel, convince it to send the flag to the user, that's it .
WannaCry P1 - Detection & Analysis in Memory
WannaCry was the world monster in 2017, I will post 2 or 3 parts of my approach on detecting this malware in memory a...
Memory Forensics
DeepDive
DeepDive Memory Challenge from CyberDefenders. Solved By Labib from CTFCREATORS.
WannaCry P1 - Detection & Analysis in Memory
WannaCry was the world monster in 2017, I will post 2 or 3 parts of my approach on detecting this malware in memory a...
CTF Write_up
VOL404
we need an advanced memory forensics investigator, we were under attack, and tried to take a memory dump from the mac...
Dive DEEEEP
the plain is very easy and straightforward, jump to the kernel, convince it to send the flag to the user, that's it .