14 min read 3 Devil Hosting – Analysis CLR Hosting Used by Malwares Alee Amini 23/09/2024 This types of malware use the CLR Hosting method to run malicious codes in memory without any footprint.
49 min read 0 ELF’s Story Part4: ELF’s Structure: ELF Sections Alee Amini 20/07/2024 In the upcoming part of our discussion, I will delve into the intricacies of ELF Sections. These sections serve as…
16 min read 0 ELF’s Story Part3: ELF’s Structure: ELF Section Headers Alee Amini 11/03/2024 1-Introduction Are you ready to delve deeper into the world of ELF files? In my previous part, I discussed the…
13 min read 1 ELF’s Story Part2: ELF’s Structure: ELF Header Alee Amini 16/02/2024 1-Introduction In the previous part of this story, we learned about compilation, linking, and how a linker works. In this…
15 min read 9 CVE-2023-38831: WinRAR Bug Or Windows Feature? In-Depth Analysis of Winrar CVE-2023-38831 Vulnerability Alee Amini 01/09/2023 winrar CVE-2023-38831 vulnerability Hi again,In the recent week, we saw that a new vulnerability was published by Group-IB from Winrar.I…
2 min read 0 Flareon-2020-Level2 Alee Amini 24/10/2020 2-garbage Assets: First Section: When we run the exe file, we see an error message from windows, that this file…
1 min read 0 Flareon2020-Level1 Alee Amini 24/10/2020 1-Fidler Assets: First Part: This is very simple. When you run the fidler.exe file, it shows a password box. The…