Josh StroscheinMar 184 minAnalyzing Shellcode with SCLauncherAnalyzing and debugging shellcode is a common task when performing malware analysis, exploit development and reverse engineering....
Josh StroscheinMar 42 minCustomizing FakeNet-NG's Default Web RootThis article delves into tailoring Fakenet-NG's default web root, empowering you to craft a more precise and controlled environment for...
Josh StroscheinFeb 282 minIdentifying UserForms with Oledump and OlevbaMalware authors often find creative ways to obfuscate and store their data and malicious office documents are no exception. One such...
Josh StroscheinFeb 162 minOneNote Malware: Hidden Payloads in Page VersionsWhile the abuse of OneNote documents is nothing new, a recent document I investigated revealed multiple payloads through the page...