Ring Zero Labs

Godbolt: Your Gateway to Learning Reverse Engineering

›
Are you interested in reverse engineering and software security b...

Best Beginner Reverse Engineer Lab Setup

›
Setting up a malware analysis lab is often the biggest hurdle for...

Good Faith - Computer Fraud and Abuse Act Changes

›
The Computer Fraud and Abuse Act (CFAA) has long been a source o...

Ubuntu 22.04 LTS Crash Analysis

›
Understanding why a system fails is a core skill for any research...

Man In The Middle Android APK Network Traffic

›
Intercepting HTTPS traffic is a critical step in mobile malware a...

What Do You Need For A Career In Malware Analysis?

›
Looking to start a career in Malware Analysis, Reverse Engineerin...

Obfuscated VBA, Powershell, C#

›
VBA Macros remain a dominant attack vector. Today, we perform a d...

Analyzing Python Malware

›
While most malware is written in C/C++ or Assembly, there is a gr...

Analyzing TLS Callbacks

›
Ever lost control of a program before your debugger could even pa...

Fast and Free Malware Analysis Lab Setup

›
How do you get started in Malware Analysis? First, you need a saf...

Generically Unpacking Ransomware With Memory Breakpoints

›
Today we look at how to generically unpack ransomware utilizing m...

Down The Rabbit Hole...

›
[*] ACQUIRING RABBIT [*] GEO SEQUENCE I...

Analysis CVE-2017-11882 Microsoft Equation Editor Exploit

›
Today's video covers how to analyze CVE 2017-11882 : the Micr...

The Wonderful World of MIPS

›
The ever-growing Internet of Things (IoT) brings a new wave of ma...

Metasploit - Some Assembly Required

›
Metasploit is the most prevalent exploit framework in the world t...

Reverse Engineering and Debugging 3rd Party APKs

›
Today we demonstrate how to reverse engineer 3rd party APKs, what...

Malicious Link Files

›
Malware authors are implementing malicious link files into their ...

Triaging Malicious Word Document

›
Today we demonstrate how to quickly triage a malicious Word docum...

Triaging Java JAR Files

›
Today we show how to quickly triage Java JAR files and how to esc...

Worms Caught In Brambuls

›
Today we analyze a classic SMB worm that leverages GMAIL for Comm...

Large Victim Credential Server Uncovered

›
Today we analyze a seemingly normal PDF Phishing campaign but it ...

Analyzing Obfuscated Locky Ransomware Downloader

›
Today we analyze a malicious HTML document that claims the user m...

Fastest Automated Malware Analysis Lab Setup with FREE VM and Tools

›
How do you get started in Malware Analysis? First, you need an an...

Bypassing Anti-Analysis Technique In Office Documents

›
Today we analyze a malicious, VBA Enabled Word Document. The auth...

Choda Ransomware - The Lazy Malware

›
Today we analyze a piece of malware that calls itself Choda Ranso...

Copying Non-Selectable Window Text

›
Today we examine a quick malware analysis "life hack" t...

FBI Ransomware

›
Today we analyze a variant of "Scareware" that poses as...

What's a packer and why are they used?

›
Today we demonstrate what a packer is, why it might be used, and ...

Quick PDF Analysis

›
Today we demonstrate how to quickly analyze a suspicious PDF file...

AES Encrypted Phishing Site

›
Phishing remains one of the most pervasive threats to end-users. ...

To Kill The Mocking Porn - Fsociety Crypto Miner

›
Fsociety is a Monero (XMR) miner that uses multiple layers of tri...

Best Free Antivirus Solutions from a Malware Analysts Perspective

›
With so many free security products on the market, it is hard to ...

Malware Analysis and Exploit Development - Tools of the Trade

›
Interested in exploit development or reverse engineering? Underst...

The Multi Faceted Ursnif Trojan

›
Svchost.js is a malicious, obfuscated JavaScript dropper respons...

GecisKodu CrackMe

›
GecisKodu.exe is a "Crack Me" challenge written in Tur...

TrickBot Banking Trojan - DOC00039217.doc

›
DOC00039217.doc is a malicious Word document that utilizes VBA m...

FidRW.exe Ransomware

›
FidRW.exe is a multi-stage demonstration binary designed for sec...

CVE2017-0199 RTF Exploit Analysis

›
CVE-2017-0199 exploits a logical "Link Type" confusion...

Bladabindi RAT

›
OO.exe is a Remote Access Trojan (RAT) belonging to the Bladabin...

ElmersGlue_3.exe

›
ElmersGlue is a ransomware application designed to "lock...
Home
View web version