Malware Analysis

Malware Analysis

Welcome to my dedicated space for malware analysis.
This section highlights my hands-on research, where I dissect malicious software to understand its behavior, techniques, and impact.

Through a mix of static analysis, dynamic testing, and forensic investigation, I break down how malware operates under the hood. My goal is not only to strengthen my own reverse engineering skills but also to share practical insights that can help defenders, researchers, and anyone curious about digital threats.

Here you’ll find:

  • Step-by-step write-ups documenting analysis of real-world samples
  • Educational breakdowns of malware techniques (evasion, persistence, exploitation)
  • Practical workflows and tool usage for threat research

Each post is written to be approachable, whether you’re new to malware research or an experienced practitioner looking for structured case studies.

➡️ Dive into the posts below to explore my malware analysis journey.