Consulting

Attentive. Comprehensive. Accessible. Clear.

Technical Blog

Hashes

Hashes

Friends, hello everyone! In this article, we will talk about such an important part of every antivirus engine as the hashing module. We will talk about data verification, blacklisting and whitelisting, finding out how similar or different data is, and touching on the topic of fuzzy hashing algorithms. Get comfortable in your chairs!

Inside BlackMatter: Technical Analysis of BlackMatter Ransomware

Inside BlackMatter: Technical Analysis of BlackMatter Ransomware

Hello friends! In this article, we will analyze an executable file that repeatedly found itself on the work network of one of our clients and created problems for the client. The client asked to reverse-engineer the threat, conduct a security audit and provide a solution, which we did. We are always glad to cooperate in the field of cyber security, reverse engineering and security audit!  

PE Import Table Parser

PE Import Table Parser

Hello dear friends! In this article, we’ll cover the basics of the PE format and build our own parser from scratch. It will be useful for those working in cybersecurity with system software, antivirus solutions, and protection systems.

  • Eleks
  • Usoftware
  • Proffiz
  • RoboSecIT
  • SoftX

Contact us


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.