Ring Ø Labs

Ring Ø Labs DOES NOT advocate using any of the malware, techniques, or information presented here for harm and doing so may violate the law. These topics are for mitigation and educational purposes only. Read more about us here

Saturday, March 31, 2018

The Wonderful World of MIPS


The ever growing Internet of Things (IOT) brings with it a new wave of malware geared toward unfamiliar architectures. Today we take a look at how to compile, analyze, and debug MIPS based binaries.

Tuesday, March 6, 2018

Metasploit - Some Assembly Required

Metasploit is the most prevalent exploit framework in the world today thanks to it's ease of use, support, and scalability. Today we focus on payload generation and how some "assembly" may be required. (Pun Intended)

Sunday, January 14, 2018

Reverse Engineering and Debugging 3rd Party APKs


Today we demonstrate how to reverse engineer 3rd party APKs, what tools are needed, and how to debug them without having source-code.

Wednesday, December 20, 2017

Malicious Link Files


Malware authors are implementing malicious link files into their campaigns more and more. This analysis video will detail how to quickly analyze two different types.




Thursday, September 21, 2017

Triaging Malicious Word Document


Today we show how to quickly triage a malicious word document rigged with a VBS downloader and obfuscated Powershell.


Saturday, September 9, 2017

Triaging Java JAR Files


Today we show how to quickly triage Java JAR files with a simple, free, and straightforward Java decompiler.