Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • AI SECURITY
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Browsing Category

Reverse Engineering

1 post

Reverse engineering plays a key role in dissecting malware samples to figure out its malicious intent. This learning path will teach you the very basics of reverse engineering and will make you more comfortable in performing basic to advanced analysis on any malware samples.

RReverse Engineering
UPX Packer Structure
Read More

    Practical Guide To Manual Unpacking a UPX Packed file

    • bySatyajit Daulaguphu
    • April 10, 2019
    Today, In this post I will be writing about how you can unpack a UPX packed file. Well,…

    Subscribe to Our Newsletter

    Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

    Tech Zealots
    © 2023. All Rights Reserved.
    • Privacy Policy
    • Cookies Policy
    • Write for Us