Eric's Blog

  • Home
  • Archives
  • Categories
  • Tags
  1. Home
  2. Categories
  3. Cybersecurity

Cybersecurity 20

  • Continuous Threat Exposure Management Jun 22, 2025
  • Malware Dev – Chapter 07 – Anti-Disassembly Strategies Mar 15, 2025
  • Malware Dev – Chapter 06 – Anti-VM Strategies Feb 15, 2025
  • Malware Dev - Chapter 05 - Anti-Debugging Tricks Jan 29, 2025
  • Malware Dev - Chapter 04 - Privilege Escalation Jan 25, 2025
  • Malware Dev - Chapter 03 - Persistence Jan 21, 2025
  • Malware Dev - Chapter 02 - Injection Jan 19, 2025
  • Malware Dev - Chapter 01 Jan 18, 2025
  • Malware Analysis - Mirai Wicked Sample - 9Jan2025 Jan 11, 2025
  • [Encrypted] HackTheBox - Sherlock - Lovely Malware Jan 8, 2025
  • Malware Digitally Signed by Microsoft Dec 30, 2024
  • TryHackMe: Advent of Cyber 2024 Dec 25, 2024
  • QAKBot Campaign 6Apr2023 Apr 18, 2023
  • Trojan.Kryptic - 22 Mar 2023 Mar 22, 2023
  • Odd phishing link Apr 22, 2022
  • Finding x-callback-url / Deep Link of iOS Apps Apr 1, 2022
  • Wordle Reverse Engineered Jan 31, 2022
  • Malware Analysis #2 Jan 12, 2022
  • Malware Analysis - #1 Jan 11, 2022
  • Malware Analysis Lab Jan 10, 2022

Recently Updated

  • Continuous Threat Exposure Management
  • Malware Dev – Chapter 07 – Anti-Disassembly Strategies
  • Malware Dev – Chapter 06 – Anti-VM Strategies
  • Malware Dev - Chapter 05 - Anti-Debugging Tricks
  • Malware Dev - Chapter 04 - Privilege Escalation

© Eric Turner 2026