Posts
All the articles I've posted.
-
Crackmes: EasyVM (Medium)
Reverse engineering a custom Virtual Machine interpreter to find a valid 10-character licence key using static and dynamic analysis
-
Xworm - Malware Analysis
Deep dive analysis of Xworm malware - examining payload delivery, keylogging, and data exfiltration capabilities
-
UTECTF 2026: 4en6ORev (Medium)
Forensic analysis of a corrupted PE file - restoring Magic Bytes, unpacking UPX, bypassing fake OEPs, and decrypting XOR-encoded strings
-
UTECTF 2026: The Formula (Medium)
Reverse engineering a Golang binary with encrypted functions and custom encoding to extract the flag