Dissecting BlackByte Ransomware
Explore BlackByte ransomware: ProxyShell exploits, anti-debugging, and reverse engineering insights. Dive deep into this malware’s
Learn advanced analysis techniques from real-world malware and harness this knowledge to craft your own malware, understanding attacker strategies. Empower yourself with both defensive and offensive cybersecurity skills.
In this malware analysis and reverse engineering course, you will delve even deeper into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs.
In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win any malware coming
Explore BlackByte ransomware: ProxyShell exploits, anti-debugging, and reverse engineering insights. Dive deep into this malware’s
Attention TrainSec.net students! Mark your calendars for an exclusive live workshop designed to take your
In this video, I’ll show you how to debug a DLL file with an IDA
We’re excited to share a special occasion with you – Uriel Kosayev, one of our
In the video, I draw from my 15 years of experience to explain that recognizing
In this malware analysis video, we explore how MuddyWater, an Iranian APT group, utilizes legitimate
Authors Uriel Kosayev — @MalFuzzer, Hai Vaknin — @VakninHai, Tamir Yehuda — @Tamirye94, Matan Bahar — @Bl4ckShad3 Prologue As red teamers, we are
By Uriel Kosayev (@MalFuzzer) Introduction Intel is a very well-known and large company that serves many
(CVE-2020-8842) Introduction MSI TrueColor utility comes as a pre-installed utility program on MSI gaming laptops
As Mac malware becomes more widespread, and as detection mechanisms get more sophisticated, malware actors
@2024 TrainSec. All rights reserved. Terms of Use | Privacy Policy