PinnedHuluCaptcha — An example of a FakeCaptcha frameworkHello and welcome back to another blog post. After some time of absence due to a lot of changes in my personal life ( finished university…Jun 2A response icon1Jun 2A response icon1
PinnedA beginner(s) guide to hunting web-based credit card skimmersHello everyone, and welcome back to another blog post. Today, I will show you my approaches to hunting credit card skimmers.Jan 23A response icon1Jan 23A response icon1
VexTrio’s Browser FingerprintingHey everyone, welcome back to the first blog post in 2024. Today, we are going to have a look at something I came across while looking at…Mar 19, 2024Mar 19, 2024
Gi7w0rm’s personal year review — 2023Disclaimer: The following article will highlight my work and achievements in 2023. I am not sure if this is going to be worth reading, but…Jan 6, 2024A response icon1Jan 6, 2024A response icon1
The curious case of the 7777-BotnetHello there and welcome back again to yet another blog post. Today, I am reporting on something I have been investigating for a while now…Oct 19, 2023A response icon2Oct 19, 2023A response icon2
Uncovering DDGroup — A long-time threat actorSometimes when investigating malware, you come across something that calls your attention. Something that seems odd, something that seems…Sep 8, 2023Sep 8, 2023
CloudEyE — From .lnk to ShellcodeHello and welcome back to another blog post. Today, we will look at the infection chain of a well-known malware loader called CloudEye…Jul 9, 2023A response icon1Jul 9, 2023A response icon1
DynamicRAT — A full-fledged Java RatHello everyone, welcome back to one of my sporadical blog posts. Due to some fortunate circumstances, I finally have the honor to name my…Jun 8, 2023Jun 8, 2023
A long way to SectopRatInvestigating a highly obfuscated stealer sampleJan 18, 2023A response icon1Jan 18, 2023A response icon1