Blogs

CyberDefender: XWorm Lab Challenge Writeup

Analyze malware behavior to identify persistence methods, evasion techniques, and C2 infrastructure by extracting artifacts and configuration data from static and dynamic analysis.

CTFXWormKeyloggerPersistenceWorm MalwareCybersecurityThreat HuntingCyberDefendersDefense EvasionStatic Analysis
7/31/20250xDEAD
Read More
PreviousPage 2 of 2

© 2025 Radheshyam Janwa. All rights reserved