Zero2Auto Custom Sample
- 2 MIN READ
—
MALWARE
Analysis of the first custom sample as part of the Zero2Auto course
Redline Stealer: Unpacking and config extraction
- 4 MIN READ
—
MALWARE
Redline stealer first look featuring Healer.exe, Amadey and SmokeLoader
Oski Stealer: unpacking and string decryption
- 5 MIN READ
—
MALWARE
Unpacking Oski Stealer and automating string decryption using cutter and rizin
In Search of Lost Data: A Study of Flash Sanitization Practices
- 0 MIN READ
—
FORENSICS
Best student paper at DFRWS EU 2021
Tampering with Digital Evidence is Hard: The Case of Main Memory Images
- 0 MIN READ
—
FORENSICS
Paper on evidence tampering presented at DFRWS
Enhancing malware analysis through automated functionality extraction
- 1 MIN READ
—
MALWARE
Master thesis presented at Friedrich-Alexander-Universität Erlangen-Nürnberg
Ransomware detection
- 1 MIN READ
—
MALWARE
Course paper on ransomware detection