Articles.

Jul 4, 2020

Mapping the connections inside Russia’s APT Ecosystem

Research mapping the connections between Russian APT groups including Turla, Sofacy, and APT29. Analysis of shared code, infrastructure, and organizational ties.

Jul 4, 2020

Deobfuscating APT32 Flow Graphs with Cutter and Radare2

Deobfuscating APT32 (Ocean Lotus) control flow graphs using Cutter and radare2. Techniques for removing junk code and simplifying obfuscated binaries.

Jul 4, 2020

The Evolution of BackSwap

Analysis of the BackSwap banking trojan and its innovative techniques for stealing money through browser manipulation while evading detection.

Jun 18, 2018

Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2

Continued analysis of APT33’s Dropshot malware. Automating string decryption with r2pipe, resource extraction, and completing the malware analysis with Cutter.

May 21, 2018

‘Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1’

Analyzing APT33’s Dropshot (StoneDrill) malware using Cutter and radare2. String decryption, function analysis, and Jupyter integration for malware research.

Jan 14, 2018

Reversing a Self-Modifying Binary with radare2

Analyzing a packed, self-modifying binary with radare2. Covers UPX-like packers, runtime unpacking, ESIL emulation, and debugging packed executables.

Oct 9, 2017

Reverse engineering a Gameboy ROM with radare2

Reverse engineering a Gameboy ROM using radare2. Analyzing the Z80 architecture, Game Boy memory map, and solving a CTF challenge with r2.

Sep 2, 2017

A journey into Radare 2 – Part 2: Exploitation

Part 2 of the radare2 tutorial series. Covers exploitation, buffer overflows, ROP chains, and writing exploits with radare2.

Mar 27, 2017

A journey into Radare 2 – Part 1: Simple crackme

Step-by-step tutorial for learning radare2 by solving a simple crackme. Covers installation, basic commands, visual mode, analysis, and debugging.