Recent posts
The breach of VMProtect: 2 major incidents
Discussing the breaches of VMProtect's source code that emerged in 2023
PE file format: DOS Header
Explaining the DOS header in Windows executable formats
PE file format: Import Address Table
Explaining in detail the Import Address Table (IAT) structure in Portable Executable (PE) file
Decoding a Pyinstaller ransomware sample
Decoding a ransomware sample made in Python, step by step
Using code caves to inject custom shellcode
Learn how to use code caves to inject custom code into a .exe file
Unpacking UPX (MinGW example)
Simple example on how to modify UPX-packed files
Explaining encrypted strings in .exe files
Simple explanation on encryped strings in .exe files, and how to get around them when solving crackmes
AV Evasion: Custom WinAPI function implementations
Learn how malware bypassses AV evasion (includes code examples)