Media Summary: We test and analyse a "scantime crypter" whilst explaining the terminology behind it. In this video, I reverse engineer the UnixStealer infostealer and walk through the We analyse the code of our unpacked Alpha ransomware sample and find a flaw in the

Malware Analysis Exploring Spora S Encryption Procedure - Detailed Analysis & Overview

We test and analyse a "scantime crypter" whilst explaining the terminology behind it. In this video, I reverse engineer the UnixStealer infostealer and walk through the We analyse the code of our unpacked Alpha ransomware sample and find a flaw in the A quick showcase of unpacking a Locky ransomware sample. This is not the quick-and-dirty TryHackMe Masquerade walkthrough where we speedrun answers. In this video, I walk through the ... Unpacking a NanoCore RAT using DnSpy and MegaDumper.

In this first part we unpack a .NET based We create a decrypter for Alpha ransomware. In this video, we dive into the basics of Hackers don't always need to break your data today. Many are already collecting In this video, we demonstrate how REVEN makes it possible to connect data sent through the network with the code that ...

Photo Gallery

Malware Analysis - Exploring Spora's Encryption Procedure
Malware Analysis - What is a Scantime Crypter?
Malware Mondays #04 - BTS: Exploring Strings in a Sample C Program
Reverse Engineering UnixStealer Infostealer — Decrypting the .NET Configuration
Malware Analysis - Encryption Algorithm of Alpha Ransomware (Pt. 2)
How to Identify Malware Using Basic Analysis | WannaCry Example
Malware Analysis - Unpacking Locky with VirtualAlloc
Malware Analysis Masterclass 2025 | Static + Dynamic Tricks
TryHackMe Masquerade Walkthrough: PowerShell Logs, Wireshark & Malware Analysis
Introduction to Malware Analysis
Malware Analysis - .NET Unpacking
Finding Malware with Sysinternals Process Explorer
View Detailed Profile
Malware Analysis - Exploring Spora's Encryption Procedure

Malware Analysis - Exploring Spora's Encryption Procedure

Using

Malware Analysis - What is a Scantime Crypter?

Malware Analysis - What is a Scantime Crypter?

We test and analyse a "scantime crypter" whilst explaining the terminology behind it.

Malware Mondays #04 - BTS: Exploring Strings in a Sample C Program

Malware Mondays #04 - BTS: Exploring Strings in a Sample C Program

Malware

Reverse Engineering UnixStealer Infostealer — Decrypting the .NET Configuration

Reverse Engineering UnixStealer Infostealer — Decrypting the .NET Configuration

In this video, I reverse engineer the UnixStealer infostealer and walk through the

Malware Analysis - Encryption Algorithm of Alpha Ransomware (Pt. 2)

Malware Analysis - Encryption Algorithm of Alpha Ransomware (Pt. 2)

We analyse the code of our unpacked Alpha ransomware sample and find a flaw in the

How to Identify Malware Using Basic Analysis | WannaCry Example

How to Identify Malware Using Basic Analysis | WannaCry Example

In this video, we

Malware Analysis - Unpacking Locky with VirtualAlloc

Malware Analysis - Unpacking Locky with VirtualAlloc

A quick showcase of unpacking a Locky ransomware sample.

Malware Analysis Masterclass 2025 | Static + Dynamic Tricks

Malware Analysis Masterclass 2025 | Static + Dynamic Tricks

Learn to dissect

TryHackMe Masquerade Walkthrough: PowerShell Logs, Wireshark & Malware Analysis

TryHackMe Masquerade Walkthrough: PowerShell Logs, Wireshark & Malware Analysis

This is not the quick-and-dirty TryHackMe Masquerade walkthrough where we speedrun answers. In this video, I walk through the ...

Introduction to Malware Analysis

Introduction to Malware Analysis

http://asecuritysite.com/subjects/chapter26.

Malware Analysis - .NET Unpacking

Malware Analysis - .NET Unpacking

Unpacking a NanoCore RAT using DnSpy and MegaDumper.

Finding Malware with Sysinternals Process Explorer

Finding Malware with Sysinternals Process Explorer

Finding

Malware Analysis Fundamentals: Hashing Algorithms

Malware Analysis Fundamentals: Hashing Algorithms

In this

Malware Analysis - Unpacking Alpha Ransomware (Pt. 1)

Malware Analysis - Unpacking Alpha Ransomware (Pt. 1)

In this first part we unpack a .NET based

Unpacking Encrypted Executables (TrickBot)

Unpacking Encrypted Executables (TrickBot)

Python script file: https://pastebin.com/0Y7sLkvp.

Malware Analysis - Creating a Decrypter for Alpha Ransomware Pt. 3

Malware Analysis - Creating a Decrypter for Alpha Ransomware Pt. 3

We create a decrypter for Alpha ransomware.

Malware Analysis for Beginners — Static & Dynamic Analysis Explained Step by Step

Malware Analysis for Beginners — Static & Dynamic Analysis Explained Step by Step

In this video, we dive into the basics of

Hackers Are Collecting Your Data Today ⚠️ Protect It with Q-Encrypt on iPhone

Hackers Are Collecting Your Data Today ⚠️ Protect It with Q-Encrypt on iPhone

Hackers don't always need to break your data today. Many are already collecting

XWorm Malware Analysis: From Stealthy Persistence to Keyboard Capture

XWorm Malware Analysis: From Stealthy Persistence to Keyboard Capture

In this video, we perform a full

Malware Analysis - Tracing network data back to encryption

Malware Analysis - Tracing network data back to encryption

In this video, we demonstrate how REVEN makes it possible to connect data sent through the network with the code that ...