• Check Point Research Publications
  • Crypto
  • How To Guides

Modern Cryptographic Attacks: A Guide for the Perplexed

July 2, 2024

Introduction Cryptographic attacks, even more advanced ones, are often made more difficult to understand than they need to be. ...

  • How To Guides

How to de-obfuscate a huge AutoIT script in less than two minutes

March 11, 2020

Imagine this scenario: you’re researching a malware sample which starts its execution with unpacking the archive (usually RAR or ZIP one) which ...

  • Check Point Research Publications
  • How To Guides

The Road to Qualcomm TrustZone Apps Fuzzing

November 14, 2019

Research By: Slava Makkaveev Trusted Execution Environment TrustZone is a security extension integrated by ARM into the Corex-A processor. ...

  • How To Guides

Labeless Part 6: How to Resolve Obfuscated API Calls in the Ngioweb Proxy Malware

October 3, 2018

In this part we show how to deal with obfuscated Windows API calls in Ngioweb malware using Labeless and x64dbg without reconstructing ...

Page 1

POPULAR POSTS