- Antivirus Event Analysis Cheat Sheet by Nextron Systems
- Windows API Hashing in Malware
- Data Exfiltrator - A New Tactic for Ransomware Adversaries
- Dissecting the last version of Conti Ransomware using a step-by-step Approach by CyberMasterV
- The difference between Powershell only & process specific AMSI bypasses
- Bypass AMSI by manual modification
- Emulating USB Devices In Python With No Additional Hardware!
- Implementing Direct Syscalls Using Hell’s Gate
- Hiding Windows API Imports With a Custom Loader
- PEB: Where Magic Is Stored
- LockFile ransomware’s box of tricks: intermittent encryption and evasion
- How Malware Can Resolve APIs By Hash by AGDC Services
- How to write a parser in C++ (Part 1) by ulitwitness
- How to Build a Virtual Machine from Scratch by Philip Bohun
- ChapmanWorld - Software development