The Byte Machine
  • Blog
  • Projects
  • About Me


Encryption by North Korean group

Analysis of encryption algorithms used by North Korean group

Dotrunpex malware analysis

Analysis and unpacking of DotRunpeX malware

Process Hollowing

Malware Analysis of a ransomware sample doing Process Hollowing

Reverse a backdoor

Applying static and dynamic techniques to reverse a backdoor

Active directory security

Detecting BlackCat Ransomware credential dumping with Security Events Explorer

Active directory security

Detecting OS Credential Dumping in Active Directory with Windows Security Events

Phishing framework in python

Creating HTML emails in Python to build the vector for the phishing campaign

Phishing framework in python

Creating a Phishing Framework in Python

Security Automation

Threat Hunting Security Automation with Python, Selenium and Cisco Talos Blog

PDF sanitization

Building attack chains with Google Advanced Operators and PDF Metadata

Osint tool for email crawling

An OSINT tool to crawl a list of publicly available emails from websites

Nmap introductions

Nmap: a gentle introduction to the most well-known network scanner

Raspberyy Pi WiFi cracker

Cracking Wi-Fi passwords with Raspberry Pi

Comptia Security+ exam

Passing the CompTIA Security+ Exam

Git tutorial

Git Tutorial: tutorial for beginners with interactive web lab