Ring Zero Labs
Godbolt: Your Gateway to Learning Reverse Engineering
›
Are you interested in reverse engineering and software security b...
Best Beginner Reverse Engineer Lab Setup
›
Setting up a malware analysis lab is often the biggest hurdle for...
Good Faith - Computer Fraud and Abuse Act Changes
›
The Computer Fraud and Abuse Act (CFAA) has long been a source o...
Ubuntu 22.04 LTS Crash Analysis
›
Understanding why a system fails is a core skill for any research...
Man In The Middle Android APK Network Traffic
›
Intercepting HTTPS traffic is a critical step in mobile malware a...
What Do You Need For A Career In Malware Analysis?
›
Looking to start a career in Malware Analysis, Reverse Engineerin...
Obfuscated VBA, Powershell, C#
›
VBA Macros remain a dominant attack vector. Today, we perform a d...
Analyzing Python Malware
›
While most malware is written in C/C++ or Assembly, there is a gr...
Analyzing TLS Callbacks
›
Ever lost control of a program before your debugger could even pa...
Fast and Free Malware Analysis Lab Setup
›
How do you get started in Malware Analysis? First, you need a saf...
Generically Unpacking Ransomware With Memory Breakpoints
›
Today we look at how to generically unpack ransomware utilizing m...
Down The Rabbit Hole...
›
[*] ACQUIRING RABBIT [*] GEO SEQUENCE I...
Analysis CVE-2017-11882 Microsoft Equation Editor Exploit
›
Today's video covers how to analyze CVE 2017-11882 : the Micr...
The Wonderful World of MIPS
›
The ever-growing Internet of Things (IoT) brings a new wave of ma...
Metasploit - Some Assembly Required
›
Metasploit is the most prevalent exploit framework in the world t...
Reverse Engineering and Debugging 3rd Party APKs
›
Today we demonstrate how to reverse engineer 3rd party APKs, what...
Malicious Link Files
›
Malware authors are implementing malicious link files into their ...
Triaging Malicious Word Document
›
Today we demonstrate how to quickly triage a malicious Word docum...
Triaging Java JAR Files
›
Today we show how to quickly triage Java JAR files and how to esc...
Worms Caught In Brambuls
›
Today we analyze a classic SMB worm that leverages GMAIL for Comm...
Large Victim Credential Server Uncovered
›
Today we analyze a seemingly normal PDF Phishing campaign but it ...
Analyzing Obfuscated Locky Ransomware Downloader
›
Today we analyze a malicious HTML document that claims the user m...
Fastest Automated Malware Analysis Lab Setup with FREE VM and Tools
›
How do you get started in Malware Analysis? First, you need an an...
Bypassing Anti-Analysis Technique In Office Documents
›
Today we analyze a malicious, VBA Enabled Word Document. The auth...
Choda Ransomware - The Lazy Malware
›
Today we analyze a piece of malware that calls itself Choda Ranso...
Copying Non-Selectable Window Text
›
Today we examine a quick malware analysis "life hack" t...
FBI Ransomware
›
Today we analyze a variant of "Scareware" that poses as...
What's a packer and why are they used?
›
Today we demonstrate what a packer is, why it might be used, and ...
Quick PDF Analysis
›
Today we demonstrate how to quickly analyze a suspicious PDF file...
AES Encrypted Phishing Site
›
Phishing remains one of the most pervasive threats to end-users. ...
To Kill The Mocking Porn - Fsociety Crypto Miner
›
Fsociety is a Monero (XMR) miner that uses multiple layers of tri...
Best Free Antivirus Solutions from a Malware Analysts Perspective
›
With so many free security products on the market, it is hard to ...
Malware Analysis and Exploit Development - Tools of the Trade
›
Interested in exploit development or reverse engineering? Underst...
The Multi Faceted Ursnif Trojan
›
Svchost.js is a malicious, obfuscated JavaScript dropper respons...
GecisKodu CrackMe
›
GecisKodu.exe is a "Crack Me" challenge written in Tur...
TrickBot Banking Trojan - DOC00039217.doc
›
DOC00039217.doc is a malicious Word document that utilizes VBA m...
FidRW.exe Ransomware
›
FidRW.exe is a multi-stage demonstration binary designed for sec...
CVE2017-0199 RTF Exploit Analysis
›
CVE-2017-0199 exploits a logical "Link Type" confusion...
Bladabindi RAT
›
OO.exe is a Remote Access Trojan (RAT) belonging to the Bladabin...
ElmersGlue_3.exe
›
ElmersGlue is a ransomware application designed to "lock...
Home
View web version