El Rayo Vallecano conseguía la victoria ante el Neman Grodno (0-1) y consigue adelantarse en la eliminatoria, la cual se decidirá el próximo jueves en el| Unión Rayo
“Rebels on the rise, we have […]| hn security
After attending the OST2 – Exp4011 […]| hn security
The International Dyslexia Association (IDA) released their newest issue of Perspectives on Language and Literacy titled The Structured Literacy Brief.| Wilson Language Training
As a reverse engineer, every now and then you encounter a situation where you dive deeper into the internal structures of an operating system as usual. Be it out of simple curiosity, or because you need to understand how a binary uses specific parts of the operating system in certain ways . One of the …PEB: Where Magic Is Stored Read More »| Malware and Stuff
You probably already guessed it from the title’s name, API Hashing is used to obfuscate a binary in order to hide API names from static analysis tools, hindering a reverse engineer to understand the malware’s functionality. A first approach to get an idea of an executable’s functionalities is to more or less dive through the …Deobfuscating DanaBot’s API Hashing Read More »| Malware and Stuff
Binary available at We’re given a PE32 executable file. On executing it, it displays some encrypted key. So basically, the program encrypts the key and we(or something else :P) should decryp…| Arvind S Raj's Blog
Breakdown of a recent Gozi trojan Italian targeted campaign| Toxin Labs
Breakdown of a key features stored in LummaC2 Stealer| Toxin Labs