Hi, I'm Paul.

Hacker

Threat intelligence analyst, security enthusiast and constant learner.

Read about me
Artik Blue's Picture

Malware analysis with IDA/Radare2 - C# Malware (Ziraat)

Due to popular demands I’ll continue this reverse engineering course on radare2 by focusing a little bit more on Malware a...

Reverse engineering x64 binaries with Radare2 - Defeating stack canaries

Compiling without no-stack-protector Greetings dear potential binary exploiters. Following the precedent posts where we d...

Reverse engineering x64 binaries with Radare2 - Enabling code execution on Stack

DEP and Execution on the stack Hello again my dear reverse engineers-in-progress. In the previous post on these series we ...

Reverse engineering x64 binaries with Radare2 - Bypasssing DEP with simple ROP Chains

Hello again my dear friends. And congratulations if you got as far as here, it’s been more than 20 tutorials so far and we...

Reverse engineering x64 binaries with Radare2 - Exploiting basic Buffer Overflows

And after a very well deserved rest, here we go again. While these tutorials are generally aimed at developing skills in r...

Generating contextual geographic intelligence with shodan

About shodan Shodan.io is the world known search engine that is continously indexing ipv4/ipv6 hosts connected to the inte...

Reverse engineering x64 binaries with Radare2 - 19 (unix encrypted bind shells over TLS)

You see, it’s been a while and together we’ve learned a lot of things about the C language and it’s adventures inside the ...

Reverse engineering x64 binaries with Radare2 - 18 (Bind and reverse shells)

“Shells” Today I wanto to introduce a small and simple idea, to complement what we’ve been learning on these past posts. ...

Reverse engineering x64 binaries with Radare2 - 17 (winsock, udp C&C and file exfiltration through DNS)

Buckle up kids cause this post is going to be LONG. About Winsock In computing, the Windows Sockets API (WSA), later sho...