Security research · Malware analysis · Reverse engineering
Creating a evasive malware in Rust for stealing printing files.
Reverse engineering Android malware dynamically and exploiting DB misconfigurations.
Reverse engineering a scam app and exploiting API keys.
Notes on how malware detects and evades sandboxes with practical examples