Recent posts
Escape From Evasion: Dominating Windows Functions with Detour
The security landscape is constantly evolving, and malware authors are always finding new ways to evade detection and...
PT_LOAD Injection with Python
PT_LOAD Injection is a technique used to inject malicious code into a computer system. This is done by storing the co...
Malware Development - DLL Sideloading
DLL sideloading is a method that allows an application to load a dynamic link library (DLL) from ...
Importance of Automated Malware Analysis
Automated malware analysis is a critical component of modern cyber security efforts. Malware, or malicious software, ...
Malware Development - DLL Injection
Recently I deeply research about malware evasion techniques, like DLL injection and process hollowing, and I decided ...
Why Attackers Particularly Use DLLs?
Many threat actors distributing DLL droppers instead of direct malicious executable these days. They implement their ...
What is DLL Injection?
DLL injection is a process of hiding malicious activity under another legitimate Windows process, which can be consid...
Bumblebee Malware Analysis - Part 1 - Bumblebee Dropper
We have to see basic details to determine further details, we check DIE and see this executable's type is DLL and ...