New: malwareanalysisAll contenthive-129948krhive-196917zzanhive-183959hive-180932hive-185836hive-166405steemhive-150122hive-101145hive-183397uncommonlabhive-184714hive-144064hive-145157photographyhive-188619krsuccessbitcoinlifehive-193637hive-103599hive-180301hive-193186TrendingNewHotLikersmorfal (25)in malwareanalysis • 3 years agoAwesome Executable PackingSee A curated list of resources related to executable packing (including Portable Executable, Executable and Linkable Format and others). Contains books, papers, blog posts, and other written…utkonos (25)in reverseengineering • 6 years agoAlphaBlend Campaign Part 3This continues the reversing journey of the malicious DLL, msimg32.dll , and the AlphaBlend campaign. Now that I covered how to circumvent the SEH-based anti-debugging capability, we will look more…utkonos (25)in reverseengineering • 6 years agoAlphaBlend Campaign Part 2This post continues the analysis of the AlphaBlend campaign. I’d like to thank everyone for all the fantastic feedback. One goal I have is to always show my work, and I think my elementary school…