Trainings Samples

Samples

Clear
SHA256 Author Difficulty Tags Goal Solutions Likes Comments Created
5bed39728e404838ecd679df65048abcb443f8c7a9484702a2ded60104b8c4a9 humpty_tony medium This post’s goal is to teach someone how to take a “real-world” supply-chain DLL dropper/loader and turn it into a set of actionable reversing primitives: - Reconstruct the full execution chain from NPM install hook → rundll32 execution of a shipped DLL export → staged loader → staged stealer, and understand where “initial access” ends and “payload logic” begins. - Deobfuscate a modern loader’s internals efficiently by focusing on the repeatable patterns that matter: - PEB-walking + import hashing - Encrypted static strings - Hook checks + indirect syscalls - Extract a protocol/crypto story from messy networking code, even if you don’t fully reverse the C2 1 0 04 Jan 2026