Latest Videos
IDA Memory Snapshot - Amadey Malware Unpacking & Initterm Poisoning
DuMp-GuY TrIcKsTeR
4.9K views·3 years ago
Deobfuscation of .NET using PowerShelling & dnlib - Eternity Malware
DuMp-GuY TrIcKsTeR
9.6K views·3 years ago
From Zero to Hero - Advanced Usage of Tiny_Tracer tracing APT29
DuMp-GuY TrIcKsTeR
5.0K views·3 years ago
IDAPro Reversing Delphi MBR Wiper and Infected Bootstrap Code
DuMp-GuY TrIcKsTeR
6.8K views·4 years ago
Decryption of Midas Ransomware - based on thanos ransomware builder
DuMp-GuY TrIcKsTeR
1.8K views·4 years ago
Deobfuscation SmartAssembly 8+ and recreating Original Module SAE+DnSpy
DuMp-GuY TrIcKsTeR
21.9K views·4 years ago
Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part1]
DuMp-GuY TrIcKsTeR
6.9K views·4 years ago
Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part2]
DuMp-GuY TrIcKsTeR
2.6K views·4 years ago
Reversing CryptoCrazy Ransomware - PoC Decryptor and some Tricks
DuMp-GuY TrIcKsTeR
1.2K views·4 years ago
HiveNightmare - Bug in ACLs of Registry Hives [CVE-2021-36934]
DuMp-GuY TrIcKsTeR
1.3K views·4 years ago
Dancing with COM - Deep dive into understanding Component Object Model
DuMp-GuY TrIcKsTeR
35.9K views·4 years ago
Fast API resolving of REvil Ransomware related to Kaseya attack
DuMp-GuY TrIcKsTeR
1.3K views·4 years ago

















![Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part1]](https://i.ytimg.com/vi/hxaeWyK8gMI/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCSvKmjsQONRptj_PpZtaF1-iRTjg)
![Powershell and DnSpy tricks in .NET reversing – AgentTesla [Part2]](https://i.ytimg.com/vi/BM38OshcozE/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLBs9sAIG54vLDvcAvEohP07a6e_LQ)


![[2] Lokibot analyzing - spoofing GULoader and LokiBot C2 [part2] - INetSim + BurpSuite](https://i.ytimg.com/vi/N0wAh26wShE/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLA5Fm9pPgV87eo-_9ivJcK802mrKQ)

![HiveNightmare - Bug in ACLs of Registry Hives [CVE-2021-36934]](https://i.ytimg.com/vi/mgFLUQ_3QYM/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLA9SoEIQZyHIU4pwOyC6LD1O2D9aA)


![[2] Lokibot analyzing - spoofing GULoader and LokiBot C2 [part1] - Own implementation in Python](https://i.ytimg.com/vi/-FxyzuRv6Wg/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLCM3S180XanlJQntHEqtkFhgq9qDQ)
![[1] Lokibot analyzing - defeating GuLoader with Windbg (Kernel debugging) and Live C2](https://i.ytimg.com/vi/K3Yxu_9OUxU/hqdefault.jpg?sqp=-oaymwEcCNACELwBSFXyq4qpAw4IARUAAIhCGAFwAcABBg==&rs=AOn4CLAH1BpPuEEtBrsBMaVzJP_FbO1Qbw)
![Advanced Memory Forensics (Windows) - Threat_Hunting and Initial Malware_Analysis [part1]](https://i.ytimg.com/vi/WB29XIUZjRU/hqdefault.jpg?sqp=-oaymwE2CNACELwBSFXyq4qpAygIARUAAIhCGAFwAcABBvABAfgB_g6AArgIigIMCAAQARgTIEUofzAP&rs=AOn4CLBdWjy7-KSGcqaR6GWlUyBF4HSNYw)
