14 min read 4 Devil Hosting – Analysis CLR Hosting Used by Malwares Alee Amini 23/09/2024 This types of malware use the CLR Hosting method to run malicious codes in memory without any footprint.
15 min read 9 CVE-2023-38831: WinRAR Bug Or Windows Feature? In-Depth Analysis of Winrar CVE-2023-38831 Vulnerability Alee Amini 01/09/2023 winrar CVE-2023-38831 vulnerability Hi again,In the recent week, we saw that a new vulnerability was published by Group-IB from Winrar.I…
22 min read 21 ELF’s Story Part1: How is an ELF create Alee Amini 06/08/2023 1- Introduction Hello guys I’m back with a new series of blog posts.Last year I focused on Linux binaries. I…
2 min read 0 Flareon-2020-Level2 Alee Amini 24/10/2020 2-garbage Assets: First Section: When we run the exe file, we see an error message from windows, that this file…
1 min read 0 Flareon2020-Level1 Alee Amini 24/10/2020 1-Fidler Assets: First Part: This is very simple. When you run the fidler.exe file, it shows a password box. The…
1 min read 1 Binary Instrumentation-Part1 Alee Amini 22/09/2020 به نام خدا با سلام. تصمیم گرفتم که یک مجموعه ای تهیه کنم که بتونم مفاهیم Binary Instrumentation رو به…