Subscribe to Nixhacker - The Reverser's Space
Get the latest posts delivered right to your inbox
Check your inbox and click the link to confirm your subscription
Please enter a valid email address!
5 August 2020
Fixing DLL exports for DLL hijacking(DLL proxy)
31 July 2020
Mitigate and Detect Local Privilege Escalation cause due to Symbolic Links
10 June 2020
Developing and Installing your first Kernel driver in Windows 10(under 10 min)
28 April 2020
Breaking Antivirus: Arbitrary file deletion using Symbolic link
16 April 2020
Understanding and Exploiting Symbolic links in Windows - Symlink Attack EOP
21 February 2020
Segmentation in Intel x64(IA-32e) architecture - explained using Linux
26 December 2019
Malware analysis interview questions with detailed answers (Part 4)
12 November 2019
Developing hypervisor from scratch: Part 4 - Setting up HOST and GUEST State
30 September 2019
Developing hypervisor from scratch: Part 3 - Setting up VMCS
9 August 2019
Developing hypervisor from scratch: Part 2 - VMXON Operation
8 August 2019
Developing hypervisor from scratch: Part 1 - Intro and Setup
19 July 2019
Getting processor information using cpuid instruction and inline assembly
cpuid is a processor specific instruction used to get processor's information and features. In this post we are going to learn how to extract those information using inline assembly in c.
22 November 2018
What's at 1st sector/MBR of hard disk(MBR Forensics)
MBR have lots of details about the hard disk or other storage disk which can be used for forensics purposes. In this article we will analyze the MBR's 512 bytes of data and try to interpret it.
28 September 2018
Analyse default BIOS protection of your system against LoJax: UEFI rootkit
LoJax is first rootkit in the wild that try to write a UEFI module into system's SPI Flash Memory. You can analyse your system's default BIOS/UEFI protection against such malware which we will discuss in this article.
18 September 2018
Malware analysis interview questions with detailed answers (Part 3)
Here are few more important questions with detailed answers for malware analysis interview. Topic covers in this part is Dynamic analysis, static analysis and debugging.
No results found
Go to article
Search new term
You've successfully subscribed to Nixhacker - The Reverser's Space
Great! Next, complete checkout for full access to Nixhacker - The Reverser's Space
Welcome back! You've successfully signed in
Success! Your account is fully activated, you now have access to all content.