cyber.wtf
Notes on Pyarmor BCC Mode
.NET Deobfuscation
Unpacking Pyarmor v8+ scripts
Detection of Command and Control Traffic Using Suricata
Harvesting the Database - 5 CVEs in TOPqw Webportal
Destructive IoT Malware Emulation – Part 3 of 3 – Statistics
Parsing Fortinet Binary Firewall Logs
Destructive IoT Malware Emulation – Part 2 of 3 – Hooking Techniques
Give Me Your FortiGate Configuration Backup and I Rule Your Network
Destructive IoT Malware Emulation – Part 1 of 3 – Environment Setup