Tags

Browse blog posts by specific topics, techniques, or challenge types.

Huntress CTF 2025

All posts related to the Huntress 2025 Cybersecurity CTF.

PowerShell

Posts covering PowerShell payloads, deobfuscation, operational techniques, and reverse engineering.

AMSI Bypass

Payloads involving AMSI bypass, reflection, memory patching, and evasion.

Defense Evasion

Posts that analyze scripts or binaries modifying Microsoft Defender visibility, exclusions, or policy.

AutoIt

Samples and challenges involving AutoIt-based malware and scripts.

UPX

Packed binaries where UPX is used as part of the protection or obfuscation.

Crypto Wallets

Malware and investigations targeting browser wallet extensions and desktop cryptocurrency wallets.

Timing Attacks

Posts covering timing side-channels, race conditions, and microarchitectural attacks.

Side Channels

Posts covering timing side-channels, race conditions, and microarchitectural attacks.

Newline Injection

Posts covering newline injection vulnerabilities in various contexts.

Windows

Posts covering Windows-specific techniques, APIs, and behaviors.

Obfuscation

Posts covering string escaping, packing, encoding layers, and general deobfuscation techniques.

CyberChef

Posts that use CyberChef recipes for decoding, deobfuscation, and quick malware analysis workflows.

PHP

Posts involving PHP malware, web shells, and server-side deobfuscation/reversing.