#malware-analysis
Read more stories on Hashnode
Articles with this tag
Protecting Code and Uncovering Debuggers by Watching Memory · I have been exploring some anti-debug techniques listed in the CheckPoint Anti-Debug...
Detecting debugger by inspecting Kernel32.CloseHandle's output. · The documentation of CloseHandle states the following: If the application is running...
Abusing Unhandled Exception filters to detect debuggers · Here's another technique for my anti-analysis collection! It uses an Exception Handler and an...
AI-Assisted Reversing Engineering in 2026 · Recently, I discovered this IDAPro plugin called Gepetto [1]. It connects IDA to LLMs and assists in...
Recently, I’ve been reversing this first-stage that dynamically loads a copy of ntdll.dll in order to hide malicious behavior from Sandboxes and EDRs....