AccidentalRebel.com
  • Archives
  • Categories
  • Tags
  • Newsletter
  • About
Reverse Engineering

IOLI Crackme 0x04

Wed 29 September 2021
IOLI Crackme 0x04

IOLI Crackme 0x04 walkthrough — the password is any digits that sum to 15, revealed by tracing sscanf-based accumulation through static analysis in IDA.

Read more →
re crackme
Malware Analysis

Building my Virtual Cybersecurity Home Lab

Sun 05 September 2021
Building my Virtual Cybersecurity Home Lab

How I built a virtual cybersecurity home lab with pfSense, Metasploitable, Kali, Splunk, Snort, and a dedicated malware analysis network using Remnux.

Read more →
malware dev
Malware Analysis

Making a RAT

Tue 13 July 2021
Making a RAT

Building RATwurst, a RAT in C and Python, with runtime DLL loading, socket comms, anti-sandbox checks, and basic AV evasion — for educational purposes only.

Read more →
malware dev
Security

Finding phished passwords on a scam site

Sat 01 May 2021
Finding phished passwords on a scam site

How I found a publicly accessible victims.txt file storing phished Facebook credentials on a 000webhost server and what happened when I reported it.

Read more →
phishing threat-hunting osint
CTF

Emprisa Maldoc Writeup

Fri 30 April 2021
Emprisa Maldoc Writeup

Writeup for the Emprisa Maldoc CTF — analyzing a CVE-2017-18822 exploit using rtfdump, speakeasy shellcode emulation, and EQNEDT32 process debugging.

Read more →
maldoc writeup
Security

Investigating an FB phishing site

Sat 24 April 2021
Investigating an FB phishing site

OSINT into a Facebook phishing campaign spreading via friend-tagging — separate hosting domains, Vietnamese code traces, and possible Phishing-as-a-Service.

Read more →
phishing threat-hunting osint
CTF

The Emprisa Maldoc Challenge

Sun 04 April 2021
The Emprisa Maldoc Challenge

How I turned a real-world malicious document exploit into the Emprisa Maldoc CTF on CyberDefenders — 14 questions targeting intermediate maldoc analysts.

Read more →
maldoc ctf
Reverse Engineering

IOLI Crackme 0x03

Mon 22 March 2021
IOLI Crackme 0x03

IOLI Crackme 0x03 walkthrough — reverse engineering a Caesar-style cipher that shifts each character by 3 to decode garbled success and failure strings.

Read more →
re crackme
Malware Analysis

Maldoc101 Writeup (Part 2)

Sun 14 March 2021

Continuing the Maldoc101 malware analysis — decoding obfuscated VBA string concatenation to reveal WMI class references used for process execution.

Read more →
re malware_analysis malware
Malware Analysis

Maldoc101 Writeup (Part 1)

Sat 13 March 2021

Step-by-step maldoc analysis of the Maldoc101 challenge using oledump and olevba — deobfuscating VBA macros and tracing the WMI process execution chain.

Read more →
re malware_analysis malware
« Previous 1 2 3 4 5 6 Next »
AccidentalRebel

AccidentalRebel

Juan Karlo Licudine

Hands-on AI security. I threat model AI agents, build containment tools, track real-world attacks, and write about what I find.

  • Email
  • LinkedIn
  • GitHub

For weekly Cybersecurity x AI threat analysis subscribe below

© AccidentalRebel. Hands-on AI security. I threat model AI agents, build containment tools, track real-world attacks, and write about what I find.
  • Email
  • LinkedIn
  • GitHub