Behind the Shell: Investigating a Stealthy AppleScript macOS Implant
A deep dive into a fileless macOS malware campaign leveraging AppleScript, osascript, and curl to execute modular payloads without touching disk.
2399 words
|
12 minutes
Cover Image of the Post
Abusing CDATA: Obfuscated JavaScript in SVG Phishing Attacks
Analyzing a real-world phishing technique where a harmless-looking SVG image hides malicious JavaScript in plain sight.
1443 words
|
7 minutes
Cover Image of the Post
Malicious Mechanics of ELF: Shellcode, Segments & Stealth
A deep dive into how attackers exploit ELF internals to inject, persist, and execute malicious payloads on Linux systems
1493 words
|
7 minutes
Cover Image of the Post
Stealing Control with LD_PRELOAD
Explore how LD_PRELOAD can hijack Linux binaries at runtime—powerful for both reverse engineering and real-world exploitation
966 words
|
5 minutes
Cover Image of the Post
The Elliptic Curve Backdoor: A Hidden Flaw in Randomness
A deep dive into how randomness and elliptic curves intertwine—and how one subtle backdoor almost compromised it all
714 words
|
4 minutes
Cover Image of the Post