
Reverse Engineering ARM based Mirai Botnet
In this video, I’ll walk you through my methodology and insights gained when uncovering how
Learn advanced analysis techniques from real-world malware and harness this knowledge to craft your own malware, understanding attacker strategies. Empower yourself with both defensive and offensive cybersecurity skills.
In this malware analysis and reverse engineering course, you will delve even deeper into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs.
In this malware analysis and reverse engineering course, you will delve into the inner core of dissecting different malware types and variants, understand the adversarial mindset behind them and the used TTPs. At the end of the course, you will gain the power and knowledge to win any malware coming
In this video, I’ll walk you through my methodology and insights gained when uncovering how
We’re excited to share the recorded workshop on Remote Thread Injection and EDR-based detection that
Explore BlackByte ransomware: ProxyShell exploits, anti-debugging, and reverse engineering insights. Dive deep into this malware’s
In this video, I’ll show you how to debug a DLL file with an IDA
We’re excited to share a special occasion with you – Uriel Kosayev, one of our
In the video, I draw from my 15 years of experience to explain that recognizing
In this malware analysis video, we explore how MuddyWater, an Iranian APT group, utilizes legitimate
Authors Uriel Kosayev — @MalFuzzer, Hai Vaknin — @VakninHai, Tamir Yehuda — @Tamirye94, Matan Bahar — @Bl4ckShad3 Prologue As red teamers, we are
By Uriel Kosayev (@MalFuzzer) Introduction Intel is a very well-known and large company that serves many
(CVE-2020-8842) Introduction MSI TrueColor utility comes as a pre-installed utility program on MSI gaming laptops
@2025 TrainSec. All rights reserved. Terms of Use | Privacy Policy
Not ready to commit to a learning pathway?
We’ll keep you up to date with the latest cybersecurity trends, free content, and discounts in our newsletter.