Open in app

Sign in

Write

Sign in

Adam Munger
Adam Munger

18 Followers

Home

About

Published in

The Startup

·Pinned

Static Analysis of the Emotet Malware

Figure 2 below shows the ANY.RUN process graph for the initial stages of the Emotet malware sample that we’re going to analyze. There is so much interesting code to get from first click to system compromise and I wanted to explore the process in a little more detail. …

11 min read

Static Analysis of the Emotet Malware
Static Analysis of the Emotet Malware

11 min read


Published in

The Startup

·Nov 12, 2020

How to Build a Computer Security Lab in VMWare Workstation Pro

When working with malware or other offensive cyber tools it’s very important to ensure that malware and other exploits don’t escape to your computer, network, or worse yet, onto the Internet. VMWare Workstation Pro has been my go to desktop virtualization platform for many years. It’s a mature, stable and…

Vmware

5 min read

How to Build a Computer Security Lab in VMWare Workstation Pro
How to Build a Computer Security Lab in VMWare Workstation Pro
Vmware

5 min read

Adam Munger

Adam Munger

18 Followers

Cyber Leader and Eternal Student

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams