AccidentalRebel.com
  • Archives
  • Categories
  • Tags
  • Newsletter
  • About
Malware Analysis

Making a RAT

Tue 13 July 2021
Making a RAT

Building RATwurst, a RAT in C and Python, with runtime DLL loading, socket comms, anti-sandbox checks, and basic AV evasion — for educational purposes only.

Read more →
malware dev
Security

Finding phished passwords on a scam site

Sat 01 May 2021
Finding phished passwords on a scam site

How I found a publicly accessible victims.txt file storing phished Facebook credentials on a 000webhost server and what happened when I reported it.

Read more →
phishing threat-hunting osint
CTF

Emprisa Maldoc Writeup

Fri 30 April 2021
Emprisa Maldoc Writeup

Writeup for the Emprisa Maldoc CTF — analyzing a CVE-2017-18822 exploit using rtfdump, speakeasy shellcode emulation, and EQNEDT32 process debugging.

Read more →
maldoc writeup
Security

Investigating an FB phishing site

Sat 24 April 2021
Investigating an FB phishing site

OSINT into a Facebook phishing campaign spreading via friend-tagging — separate hosting domains, Vietnamese code traces, and possible Phishing-as-a-Service.

Read more →
phishing threat-hunting osint
CTF

The Emprisa Maldoc Challenge

Sun 04 April 2021
The Emprisa Maldoc Challenge

How I turned a real-world malicious document exploit into the Emprisa Maldoc CTF on CyberDefenders — 14 questions targeting intermediate maldoc analysts.

Read more →
maldoc ctf
Reverse Engineering

IOLI Crackme 0x03

Mon 22 March 2021
IOLI Crackme 0x03

IOLI Crackme 0x03 walkthrough — reverse engineering a Caesar-style cipher that shifts each character by 3 to decode garbled success and failure strings.

Read more →
re crackme
Malware Analysis

Maldoc101 Writeup (Part 2)

Sun 14 March 2021

Continuing the Maldoc101 malware analysis — decoding obfuscated VBA string concatenation to reveal WMI class references used for process execution.

Read more →
re malware_analysis malware
Malware Analysis

Maldoc101 Writeup (Part 1)

Sat 13 March 2021

Step-by-step maldoc analysis of the Maldoc101 challenge using oledump and olevba — deobfuscating VBA macros and tracing the WMI process execution chain.

Read more →
re malware_analysis malware
Reverse Engineering

IOLI Crackme 0x02

Sat 06 March 2021

IOLI Crackme 0x02 walkthrough — computing the password via static analysis of x86 arithmetic, then confirming with dynamic analysis by stepping through IDA.

Read more →
re crackme
Tools

Introducing shcode2exe

Fri 26 February 2021

shcode2exe converts raw shellcode blobs or strings into debuggable executables targeting 32 or 64-bit Windows, with no Wine dependency when running on Linux.

Read more →
re tools malware_analysis
« Previous 1 2 3 4 5 Next »
AccidentalRebel

AccidentalRebel

Juan Karlo Licudine

Defense-first security engineer who builds tools and thinks like an attacker. Now focused on where AI and security collide.

  • Email
  • LinkedIn
  • GitHub

For weekly CyberSecurity x AI news subscribe below

© AccidentalRebel. Defense-first security engineer who builds tools and thinks like an attacker. Now focused on where AI and security collide.
  • Email
  • LinkedIn
  • GitHub