Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Follow Me
MMalware Analysis

A Comprehensive Guide To PE Structure, The Layman’s Way

  • bySatyajit Daulaguphu
  • August 15, 2022
In this article, we will look at the PE Structure or Portable Executable file format or PE File…
code obfuscation techniques
Read More
    Read More about Code Obfuscation: 10 Powerful Techniques for Maximum Security!
    TThreat Lab

    Code Obfuscation: 10 Powerful Techniques for Maximum Security!

    • bySatyajit Daulaguphu
    • October 12, 2023
    What is Code Obfuscation? Code obfuscation is a technique used by malware authors and other malicious actors to…
    Qakbot Dll Side Loading
    Read More
      Read More about How QakBot Leverages DLL Side Loading Technique? – Technical Analysis
      MMalware Analysis

      How QakBot Leverages DLL Side Loading Technique? – Technical Analysis

      • bySatyajit Daulaguphu
      • November 5, 2022
      QBot is a banking trojan that steals victims’ credentials and is usually spread via phishing campaigns. QBot aka…
      cybersecurirty laptop
      Read More
        Read More about What Is the Best Computer for Cyber Security? 8 Options
        TTech Bytes

        What Is the Best Computer for Cyber Security? 8 Options

        • bySatyajit Daulaguphu
        • August 23, 2022
        Although, nearly every advanced computer can do a few cyber security tasks. But, to perform them with no…
        Malware Persistence Techniques
        Read More
          Read More about 11 Critical Malware Persistence Mechanisms You Should Be Familiar With!
          MMalware Analysis

          11 Critical Malware Persistence Mechanisms You Should Be Familiar With!

          • bySatyajit Daulaguphu
          • April 7, 2022
          In this article, we’ll take a look at some of the most common malware persistence mechanisms as malware…

          Posts navigation

          1 2 … 5 Next

          Support Tech Zealots

          Tech Zealots
          © 2023 Tech Zealots. All rights reserved.
          • Privacy Policy
          • Cookies Policy
          • About