HOME

Recent posts

Atomic macOS Stealer (AMOS) Analysis

12 minute read

Hello everybody, this is my first macOS malware analysis, I took a sample from malwarebazaar and tried to reverse it, the sample was uploaded by Cryptolaemus...

QAKBOT BB Configuration and C2 IPs List

4 minute read

This is my first malware blog post, hope it will be useful to someone, I’ll not go deeper in the malware details because there are plenty of detailed reports...

Emotet Malicious Excel Analysis

1 minute read

Sometime ago a friend of mine sent me a suspicious email containg a zip file with an xls, at the time I didn’t focus too much on what the file does and simpl...

DVIA v2 iOS URL Runtime Manipulation with Frida

2 minute read

After my previous blog posts about DVIA v2 Anti-Debug and Frida with Swift some guys asked me about the URL Runtime Manipulation challenge in DVIA v2. I wil...

iOS Strings Obfuscation in Swift

4 minute read

Usually when reversing an iOS Application, it’s common to see methods and strings that can help an attacker to figure out how the application works. When I’...

ELF x64 Bypass NX with mprotect()

4 minute read

In this blogpost, I’ll explain how to bypass NX using mprotect() in order to make the stack executable.