Tags
-
CTI
Research
Programming
x86_64
linux
malware
Forensics
ReverseMe
low-level
Malware
opsec
Analysis
Rust
macOs
ReME
analysis
CTI
Research
- Executing Mach-Os In-Memory
- macOS Malware Development I
- DLL-Load Proxying
- OSINT, Blockchain, and Adversary Profiling
Programming
- macOs Malware Development II
- The Operator's Guide to Malware
- Malware Development: Botnet-Based
- Introduction to RE Cipher
- The Art of Self-Mutating Malware