
5 Cybersecurity lessons to learn from Stranger Things Featured
Netflix’s original series ‘Stranger Things‘ season-4 is on its way to a worldwide release today. As the plot deepens every […]
Netflix’s original series ‘Stranger Things‘ season-4 is on its way to a worldwide release today. As the plot deepens every […]
The Scope Recently, we conducted a red team assessment for a large enterprise client where the scenarios allowed were to […]
Prologue In the previous blogpost, we reverse engineered a binary and extracted the password from within it. This binary however […]
As you might already be aware that ARM powers a variety of low-powered devices around us, including but not limited […]
Prologue The main focus of this blog is to give a push start to the beginners to get in the […]
Welcome to the part 4 of malware development .In the previous parts 1, 2-1, 2-2 and 3, we created a […]
In the previous parts 1, 2-1 and 2-2 of this series we created a binary that can connect to, and […]
In the previous parts of this blog series, I introduced the concept of writing a full-undetectable malware and about […]
Welcome to the second part of the malware development blog series. Here’s the link to Part 1. Given the length […]
If you are in cybersecurity, especially Red Teaming, writing a full-undetectable (FUD) malware is a great skill to have. Folks […]