Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Cyber Assassin
  • Malware Analysis
  • Reverse
  • CTF
  • Tutorials
  • All Categories
    Cyber Assassin

    Cyber Assassin

    Computer engineer interested in reverse engineering and malware analysis

    • Egypt
    • Email
    • Twitter
    • Facebook
    • LinkedIn
    • GitHub

    Recent posts

    Malware-Analysis

    Xworm

    Xworm Analysis Report...

    26 Jan 2025

    27 minute read

    Malware-Analysis

    Phobos Ransomware

    Phobo Ransomware Analysis Report...

    20 Jan 2025

    17 minute read

    CTF

    ICMT CSC2 Finals

    Writeup for ICMT Reverse challenges ...

    29 Jul 2024

    9 minute read

    Tutorials

    PowerShell

    Obfuscated PowerShell walk-through...

    25 Jul 2024

    6 minute read

    CTF

    ICMT CSC2

    Writeup for ICMT Reverse challenges ...

    27 Jun 2024

    2 minute read

    Malware-Analysis

    IcedID

    IcedID Dropper Analysis...

    17 Apr 2024

    8 minute read

    Malware-Analysis

    $tealer

    $tealer walkthrough (Dridex Based) ...

    22 Mar 2024

    7 minute read

    CTF

    w0lv35 CTF

    Writeup for WolvCTF Reverse & PWN challenges ...

    18 Mar 2024

    7 minute read

    • Previous
    • 1
    • 2
    • Next
    • Follow:
    • Twitter
    • Feed
    © 2025 Cyber Assassin. Powered by Jekyll & Minimal Mistakes.