Technical Research
Malware analysis, exploitation techniques, and security research findings
Malware analysis, exploitation techniques, and security research findings
Comprehensive analysis of U-Boot bootloader internals and security vulnerabilities. Discovered critical 1-second attack window enabling complete device compromise.
Proof of concept and detailed analysis of the sudo chroot security flaw affecting Linux distributions worldwide.
In-depth malware analysis of Remcos RAT with comprehensive behavioral and static analysis.
Comprehensive analysis of NetSupport malware including network behavior and persistence mechanisms.
Detailed analysis of AsyncRat including command and control infrastructure and evasion techniques.
Comprehensive .NET source code analysis of AESRT Ransomware including encryption mechanisms and persistence.
Access the full archive of malware analysis blogs, research notes, and technical findings on Notion.