Exploring Rootkits and the Windows Kernel
What is the Kernel? In the simplest terms possible the kernel is like a bridge between the software and the bare bones hardware. The kernel has full access to the hardware of the computer and can u...
What is the Kernel? In the simplest terms possible the kernel is like a bridge between the software and the bare bones hardware. The kernel has full access to the hardware of the computer and can u...
Many malware authors do not want their payloads to be easily reversible and they will partake in various methods to deter an analyst from studying the binary. Some of these methods are to utilize e...
What is the PE File Format? The PE file format is the Portable Executable file format. All windows executables and object files follow the PE file structure. There is a lot of detail about why th...
Basics of Assembly for Makers and Hackers Assembly language is a low-level programming language that serves as a direct link between high-level languages and machine code, which provides instructi...
Below categories of malware will be covered then research strategies and industry frameworks will be discussed. Various malware types will be listed and briefly described, the MITRE ATT&CK fram...
Setting up Flare VM for Malware Analysis In this guide we are going to learn how to setup a safe and practical lab enviroment for malware analysis. We will be focusing on a windows lab enviroment ...