Author: João Vitor (@Keowu) - Security Researcher Introduction This article aims to document and also present my steps during the reverse engineering stages of three major classics from my childh...
Author: João Vitor (@Keowu) - Security Researcher Introdução Este artigo visa documentar e também apresentar meus passos durante os estágios de engenharia reversa de três grandes clássicos da min...
Analyzing Mutation-Coded - VM Protect and Alcatraz Author: João Vitor (@Keowu) - Security Researcher Introduction This article aims only to illustrate some of the techniques used in code that ha...
Analisando códigos com mutação - VM Protect e Alcatraz Author: João Vitor (@Keowu) - Security Researcher Introdução Este artigo visa apenas ilustrar algumas das técnicas utilizadas em códigos qu...
Author: João Vitor (@Keowu) - Malware Security Researcher Sample identification hash Wintapix é um malware identificado e reportado originalmente pela empresa “Fortinet” em um artigo anunciando s...
Author: João Vitor (@Keowu) - Malware Security Researcher Sample identification hash Wintapix is a malware identified and originally reported by the company “Fortinet” in an article announcing it...
Malware Analysis Writeup | Bat Stealer(Chine Encode) and introduzing WinHandKill X64DBG Plugin Author: João Vitor (@Keowu) - Malware Security Researcher Sample identification hash Este malware nã...
Malware Analysis Writeup | Bat Stealer(Chine Encode) and introduzing WinHandKill X64DBG Plugin Author: João Vitor (@Keowu) - Malware Security Researcher Sample identification hash This malware do...
Malware Analysis Writeup | Amadey + Custom Dropper’s with Redline Stealer with Net Reactor on shellcode’s and mutant Avkiller Author: João Vitor (@Keowu) - Malware Security Researcher Sample iden...
A new version of content is available.