PinnedRansomChatGPT: Ransomware Negotiation AI SimulatorIntroducing RansomChatGPT, a ransomware negotiation simulator you can use against all ransomware chat transcripts publicly released via…Nov 13, 2023Nov 13, 2023
CyberDefenders: Szechuan Sauce CTF WriteupAnother CTF with CyberDefenders; Rick & Morty forensics challenges courtesy of DFIRMadness.Nov 3, 2022Nov 3, 2022
SANS KringleCon 2021 — Printer Exploitation (Hash Extension Attack)Hello all and Happy New Year! This is a writeup for the fourth Holiday Hack Challenge from SANS, KringleCon 4: Calling Birds. This will be…Jan 8, 2022Jan 8, 2022
Malware Traffic Analysis 3Malware Traffic Analyses are a set of CTF challenges for analysing traffic and an excellent way of developing threat hunting using tools…Aug 4, 2021Aug 4, 2021
OSINTifying TargetsHello folks, it’s been a while but today I’m going to show you how to OSINTify targets based on different types of attacks. From this…Jun 22, 20211Jun 22, 20211
SEC504: Hacker Tools, Techniques, Exploits and Incident Handling — Review (2021)Jun 3, 20212Jun 3, 20212
SANS Kringlecon 2020 — ARP ShenanigansIt’s that time of the year again; the 2020 SANS Holiday Hack Challenge, featuring KringleCon 3: French Hens! This year’s event had a total…Jan 11, 2021Jan 11, 2021
Practical Malware Analysis — Chapter 6 LabsPractical Malware Analysis is a book introducing fundamental and advance analysis of malware both statically and dynamically. Today, we…Dec 11, 2020Dec 11, 2020
MalwareTech Malware Reversing Challenges — RansomwareHere we are with another of the malware reverse engineering challenges from MalwareTech — this time Ransomware.Nov 28, 2020Nov 28, 2020
MalwareTech Malware Reversing Challenges — StringsHello folks, we’re here for some more CTF challenges — this time malware reverse engineering. MalwareTech (aka Marcus Hutchins) is a…Nov 11, 2020Nov 11, 2020