Behind the Shell: Investigating a Stealthy AppleScript macOS Implant
2025-08-03
A deep dive into a fileless macOS malware campaign leveraging AppleScript, osascript, and curl to execute modular payloads without touching disk.
2399 words
|
12 minutes

Abusing CDATA: Obfuscated JavaScript in SVG Phishing Attacks
2025-07-06
Analyzing a real-world phishing technique where a harmless-looking SVG image hides malicious JavaScript in plain sight.
1443 words
|
7 minutes

Malicious Mechanics of ELF: Shellcode, Segments & Stealth
2025-06-22
A deep dive into how attackers exploit ELF internals to inject, persist, and execute malicious payloads on Linux systems
1493 words
|
7 minutes

Stealing Control with LD_PRELOAD
2025-06-08
Explore how LD_PRELOAD can hijack Linux binaries at runtime—powerful for both reverse engineering and real-world exploitation
966 words
|
5 minutes

The Elliptic Curve Backdoor: A Hidden Flaw in Randomness
2025-06-02
A deep dive into how randomness and elliptic curves intertwine—and how one subtle backdoor almost compromised it all
714 words
|
4 minutes
