Home Published Articles
Published Articles

Published Articles

Exploitation with Shell Reverse and Infection with PowerShell using VBS File

Zusy Malware using MSI

Secure Development Using an Open Source Tool

Malware undetected by CrowdStrike

Malware Analysis – Dissecting a PDF File

Test Your Security Solution

Testing Creative Way Detection and Efficiency in Sophos Security Sensors

Outbreak Infection from Malware Bazaar, undetected by Sophos

How to Treat False Positive with Threat Hunting

Hunting the Hunters-Detection and Efficiency Testing of Endpoint Security Sensors

Malware Analysis – Dissecting a PDF File

Threat Hunting Labs Engines Problems in Cybereason AV

Infection with Ransomware Using Delay in Applying Policies

Infection by Outbreak Attack Malicious

Infection with Malware By Script Python NOT Detected by AV

Fail in Detection flow of AV-based “Malware Bazaar!”

LLMNR and NBT-NS poisoning attack

Bulk Extractor – Looking within it

Pivoting - As an Attack Weapon

Exploiting Connect Box EuroDOCSIS 3.0 - Based on CVE

Interview - eForensic Magazine

The CyberSecurity Hub - Threat Hunting

The CyberSecurity Hub - Malware Analysis