interesting stuff

Collect Windows malware/threat intelligence with dionaea honeypot / PeStudio

Written by  on August 17, 2017

Hi all! As I said in previous posts, recently I was in charge of the defense of a large network and I had to figure out a lot of things to build an effective[...]

Collect Linux malware/threat intelligence with cowrie honeypot

Written by  on August 16, 2017

Hi all! One of my main topics of research has always been malware analysis and when it comes to work the first thing you need is actually some malware[...]

NullByte challenge 0x01

Written by  on August 1, 2015

  #####NULL BYTE 0x01##### Codename: NB0x01 Download: ly0n.me/nullbyte/NullByte.ova.zip Objetcive: Get to /root/proof.txt and follow the instructions. Level:[...]

Writing exploits with an egghunter – part 1

Written by  on August 1, 2015

Today we’ll be studying the winam 6.12 playlist buffer overflow vuln. I found that vuln very interesting to study as it requieres an important amount[...]

Basic AV bypass

Written by  on July 28, 2015

Hi there, today we’ll be evading antivirus by using a basic xor stub. Firs of all, select your favourite RAT or MALWARE and copy that, then scan[...]