Recent Malware Analysis
Latest posts pulled from the research blog, using custom post summaries and Blogger labels where available.
Malware Reversing • Threat Hunting • Detection
I research suspicious applications, malware loaders, infostealers, proxyware, obfuscation techniques, and campaign infrastructure, then share findings to help analysts hunt, detect, and understand emerging threats.
Latest posts pulled from the research blog, using custom post summaries and Blogger labels where available.