Mr Empy02 APT Techniques: HTML SmugglingA few years ago, NOBELIUM APT, or APT29, were using a technique known as HTML Smuggling, which allowed them to deliver malicious software…3 min read·Nov 14, 2022----
Mr Empy01 APT Techniques: Attacks Using Office MacrosIn recent years, a new technique has been discovered by threat researchers that are being used by various APTs such as FIN7, BlackEnergy…4 min read·Nov 4, 2022----
Mr Empy02 Binary Exploitation: Format String VulnerabilityFormat String is a type of software vulnerability discovered around 1989 that could be used in security exploits. Originally thought to be…4 min read·Nov 1, 2022----
Mr Empy01 Binary Exploitation: Buffer Overflow IntroductionBuffer Overflow is one of the oldest faults in the history of computing, and to this day, it’s been a problem, but not as often as before…4 min read·Oct 30, 2022--1--1
Mr Empy2 Ways to Dump Lsass Without MimikatzLocal Security Authority Subsystem Service, or better known as LSASS, is one of the core software of a Windows server. It is responsible…2 min read·Oct 29, 2022----
Mr EmpyBanking Trojan uses legitimate Avira executable to steal data from BrazilliansIn the year 2021, a wave of email phishing attacks were made, the trojan named as Javali is one of them. It was mainly distributed in Latin…8 min read·Oct 9, 2022----
Mr EmpyAnalyzing Petya ransomwareHello hackers! In this article I will analyze the Petya ransomware that I found while browsing my social networks. Hope you like the…7 min read·Sep 11, 2022----
Mr EmpyGuia Anônima CTF: Infinitus — EasySalve salve hackers, beleza? Eu sou o MrEmpy e sejam bem-vindos a este writeup da máquina Infinitus do Guia Anônima CTF, onde eu ocupei a…5 min read·Aug 11, 2022----
Mr EmpyAssembly 16-bits: Printing StringsAssembly is undoubtedly a fantastic programming language where we can use it to control electronic components, and it is the language…6 min read·Jul 10, 2022----
Mr EmpyHow do I destroy malware and identify the author — Malware AnalysisHello Hackers, I’m MrEmpy and welcome. Today I will tell a story of how I found the author of malware.4 min read·Jun 27, 2022--1--1