top of page
Blog Posts
Dec 14, 20217 min read
Exploiting log4j | Apache Solr
Log4j is a popular Java library maintained by the Apache foundation used as a logging framework for Java. Around Friday 10th December...
7,7520
Mar 18, 20237 min read
Manually unpacking a UPX packed binary
Manually unpacking a binary that was packed with UPX, using two different methods including finding a tailjump and the pushad instruction.
1,892 views0 comments
Nov 20, 20223 min read
Ransomware investigation using Splunk - BlackSun
In this write up, we will be assuming the role of a SOC analyst investigating a ransomware incident using Splunk. The task is to...
292 views0 comments
Nov 20, 20225 min read
IcedID malware analysis
Malware analysis of an IcedID dropper contacting hxxps[://]hardenpasedaken[.]com C&C server.
324 views0 comments
Aug 31, 20226 min read
Silly Putty Malware Analysis
After completing the PMAT course, something set into motion. My new found passion for Malware Analysis. This will be the second time I...
86 views1 comment
Aug 24, 20225 min read
Python bank card stealer
Over the past couple of months I have dived deep into malware analysis and reverse engineering. Completing the PMAT course and enrolling...
241 views0 comments
bottom of page