Skip to content
BlogPaper

Archives

All the articles I've archived.

2026 9
March 3
  • Malware Persistence in Window Operating System 101

    Plays an important role in Initial Access and Execution stages because it assists malicious programs in remaining active for a long time, thus leading to create a backdoor for threat actor without detection.

  • Crackmes : Hekliet's keygenme

    Reverse engineering a custom easy keygen to find a valid licence key using static and script

  • Bypass UAC Technique 101 on Window Operating

    UAC bypass methods usually result in hijacking the normal execution flow of an elevated application by spawning a malicious child process or loading a malicious module inheriting the elevated integrity level of the targeted application.

February 2
  • Malware Injection in Window Operating System 101

    In the modern cybersecurity, the most dangerous threats are the ones you can not see. Instead of running as easily detectable standalone files, several malwares are able to hide in plain sight by injecting malicious code directly into trusted and legitimate Windows processes. This is a reason why OS get hard to detect them.

  • Crackmes: EasyVM (Medium)

    Reverse engineering a custom Virtual Machine interpreter to find a valid 10-character licence key using static and dynamic analysis

January 4
  • Xworm - Malware Analysis

    Deep dive analysis of Xworm malware - examining payload delivery, keylogging, and data exfiltration capabilities

  • UTECTF 2026: 4en6ORev (Medium)

    Forensic analysis of a corrupted PE file - restoring Magic Bytes, unpacking UPX, bypassing fake OEPs, and decrypting XOR-encoded strings

  • UTECTF 2026: The Formula (Medium)

    Reverse engineering a Golang binary with encrypted functions and custom encoding to extract the flag

  • PE02 - Figure Out The Chess's Path

    Reversing the Knight's tour 6x6 algorithm to find the correct path and target in a challenging reverse engineering problem

2025 1
September 1
  • Revenge Hotels APT Investigation

    Complete forensic analysis of a sophisticated multi-stage APT attack involving phishing, PowerShell payloads, and data exfiltration