Malware.

The Evolution of BackSwap.

Analysis of the BackSwap banking trojan and its innovative techniques for stealing money through browser manipulation while evading detection.

Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 2.

Continued analysis of APT33’s Dropshot malware. Automating string decryption with r2pipe, resource extraction, and completing the malware analysis with Cutter.

‘Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1’.

Analyzing APT33’s Dropshot (StoneDrill) malware using Cutter and radare2. String decryption, function analysis, and Jupyter integration for malware research.

Fantastic Malware and Where to Find Them.

Curated list of malware sample repositories, databases, and collections for malware analysts and security researchers.