Technical Research
Malware analysis, exploitation techniques, and security research findings.
Exploiting U-Boot's 1-Second Boot Delay
Comprehensive analysis of U-Boot bootloader internals and security vulnerabilities. Discovered critical 1-second attack window enabling complete device compromise.
Sudo Chroot Vulnerability
Proof of concept and detailed analysis of the sudo chroot security flaw affecting Linux distributions worldwide.
Remcos RAT Analysis
In-depth malware analysis of Remcos RAT with comprehensive behavioral and static analysis.
NetSupport Analysis
Comprehensive analysis of NetSupport malware including network behavior and persistence mechanisms.
AsyncRat Analysis
Detailed analysis of AsyncRat including command and control infrastructure and evasion techniques.
AESRT Ransomware
Comprehensive .NET source code analysis of AESRT Ransomware including encryption mechanisms and persistence.
Malware Analysis Collection
Access the full archive of malware analysis blogs, research notes, and technical findings on Notion.