Decompiling the Digital Shadows.

A blog dedicated to the intricate art of malware analysis and reverse engineering. We explore assembly, dissect threats, and build tools to make the digital world safer.

Recent Posts

Malware Case Studies Intermediate

Analyzing the Emotet Downloader

A deep dive into the infection vector and persistence mechanisms of the infamous Emotet trojan.

Read More →
Assembly 101 Beginner

x86 Assembly: The Stack Explained

Understanding PUSH, POP, and CALL instructions is fundamental. Let's break down how the stack works.

Read More →
CTF Writeups Advanced

HackTheBox - Obscurity Writeup

A step-by-step solution for the Obscurity machine, involving custom shell scripts and Python exploit development.

Read More →