Tags
Browse blog posts by specific topics, techniques, or challenge types.
Huntress CTF 2025
All posts related to the Huntress 2025 Cybersecurity CTF.
PowerShell
Posts covering PowerShell payloads, deobfuscation, operational techniques, and reverse engineering.
AMSI Bypass
Payloads involving AMSI bypass, reflection, memory patching, and evasion.
Defense Evasion
Posts that analyze scripts or binaries modifying Microsoft Defender visibility, exclusions, or policy.
AutoIt
Samples and challenges involving AutoIt-based malware and scripts.
UPX
Packed binaries where UPX is used as part of the protection or obfuscation.
Crypto Wallets
Malware and investigations targeting browser wallet extensions and desktop cryptocurrency wallets.
Timing Attacks
Posts covering timing side-channels, race conditions, and microarchitectural attacks.
Side Channels
Posts covering timing side-channels, race conditions, and microarchitectural attacks.
Newline Injection
Posts covering newline injection vulnerabilities in various contexts.
Windows
Posts covering Windows-specific techniques, APIs, and behaviors.
Obfuscation
Posts covering string escaping, packing, encoding layers, and general deobfuscation techniques.
CyberChef
Posts that use CyberChef recipes for decoding, deobfuscation, and quick malware analysis workflows.
PHP
Posts involving PHP malware, web shells, and server-side deobfuscation/reversing.