Posts

OS Internals : Concept of Virtual Memory & Syscalls | Reverse Engineering & Malware Analysts Interview Questions

Sniffing / Monitoring Inter Process Communication (IPC) over Named Pipe (IO Ninja)

[Video]BugBounty Hunters Must Know and Use These 10 Google Chrome Features/Tricks

[Video]Building a Machine Learning Based Web Application Firewall/Intrusion Prevention System From Scratch

Beginner's Guide to DFIR/Threat Hunting with VirusTotal Video Series

[Video]IDA Pro Video Tutorial Series for Vulnerability Researchers & Reverse Engineers[Beginners]

[Video]Virtual Machine Detection using JavaScript | Malware | Browser Exploit

[Video]Reflective Dll Injection Explained in 10 Minutes Malware Techniques

Dll Injection Explained in 10 Minutes | Video Tutorial | Basic Malware Techniques Simplified

My First $15,000 Microsoft Windows Insider Preview Bug Bounty | How to Get Started

Dynamic Binary Instrumentation(DBI)Tutorial with Intel PIN for Reverse Engineering Video

Fixing Windbg Broken Stack Trace using Fake Debugging Symbol Exported From IDA Pro.