The Malware Files

127 posts

The Malware Files banner
The Malware Files

The Malware Files

@themalwarefiles

Story-driven and technical breakdowns of the world’s most fascinating malware

CyberSpace 가입일 Nisan 2025
1 팔로잉11 팔로워
Mari
Mari@Tech_girlll·
Scare a developer with one word.
English
70
1
41
6.5K
Engr. Nnaji Daniel Chinweoke
2 years in Cybersecurity today. There’s a whole lot of story in between but God has been faithful. Today, I’m genuinely proud of how far I’ve come. I’m grateful to my mentor Dr. @ireteeh and everyone who’s contributed to my growth. 🙏 Year 3, let’s get it!
Engr. Nnaji Daniel Chinweoke tweet media
Engr. Nnaji Daniel Chinweoke tweet media
English
16
7
142
1.9K
Zinny 🎀
Zinny 🎀@Zinny_Edmund·
what applying for a software engineering job looks like in 2026
Zinny 🎀 tweet media
Enugu, Nigeria 🇳🇬 English
11
2
23
330
Ti Girl 💗
Ti Girl 💗@thoniahilary·
Guys that learn Virtual Assistant
Ti Girl 💗 tweet media
English
50
9
149
4.4K
Dizzy
Dizzy@dizzysec·
Finally, my first bug was resolved!
Dizzy tweet media
English
9
0
127
2.1K
Gabriel Odusanya 🔸
Gabriel Odusanya 🔸@gabbytech01·
How my life has been going lately Router> enable Router# configure terminal Router(config)# hostname Sw-Fw-1 Sw-Fw-1(config)# end Sw-Fw-1# Somebody send help.
English
12
3
50
1.3K
Aryan
Aryan@justbyte_·
What are the essential things to do after installing Kali Linux?
Aryan tweet media
English
131
34
556
37.6K
The Malware Files
The Malware Files@themalwarefiles·
SikoMode is a Nim-compiled infostealer that checks for a C2 connection the moment it runs. No connection, and it quietly wipes itself from disk, leaving no trace. If it does connect, it reads a JPEG off the desktop, encrypts it with RC4 using a key pulled from a separate file, and exfiltrates it. In this writeup, Sagar Joshi walks through the full analysis in IDA and x64dbg to show exactly how this beautiful nightmare pulls this off. #MalwareAnalysis #PMAT #CyberSecurity #ReverseEngineering #InfoSec medium.com/the-malware-fi…
English
0
0
0
28
The Malware Files
The Malware Files@themalwarefiles·
Only the initiated would understand
The Malware Files tweet media
English
1
0
1
6
The Malware Files
The Malware Files@themalwarefiles·
In the world of Android cybersecurity, static analysis gets a lot of red flags letting you know an app is malicious. But what if the app is literally clean until its opened? In this piece, Ruslan Mirzayev explains the role of the Reflection API, and how this tool has unfortunately been used in some of the worst ways possible, and how to defend yourself against it (hopefully). #android #malware #reflection #api #google medium.com/the-malware-fi…
English
1
0
1
19
The Malware Files
The Malware Files@themalwarefiles·
Commercial Spyware and surveillance has been on the rise lately. From NSOs Pegasus, to Sherlocks Candiru, the race is just getting started that legally puts cyberweapons in the hands of anyone with enough money to buy them. In this post, @bevijaygupta opens up the market of these paid cyberweapons, and gives a tour through the lens of India, including its impact on the Subcontinent. #spyware #malware #india #law #pegasus themalwarefiles.com/the-rise-of-co…
English
1
0
1
60