Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
eln0ty
  • Malware Analysis
  • Forensics
  • Blog
  • All Categories
    Abdallah Elnoty

    Abdallah Elnoty

    Malware Analysis & Reverse Engineering

    • 127.0.0.1
    • Email
    • Twitter
    • Facebook
    • LinkedIn
    • GitHub

    Recent posts

    Blog

    DNS Tunneling

    Exploits the DNS protocol to bypass security controls, enabling data exfiltration, C2 communication.

    24 Feb 2025

    6 minute read

    Malware Analysis

    IcedID gziploader analysis (Part1)

    IcedID , also known as BokBot, was among one of the most active malware families and has been known for loading diffe...

    17 Mar 2022

    5 minute read

    Malware Analysis

    HermeticWiper/FoxBlade Analysis (in-depth)

    The malware which targeting Ukrainian infrastructure (Specially windows devices) has since been observed in the neigh...

    04 Mar 2022

    4 minute read

    Forensics

    Digging into memory

    I’m solving memory forensics challenge with volatility2 framework from Defcon DFIR CTF 2019

    17 Feb 2022

    4 minute read

    Malware Analysis

    Playing with AsyncRAT

    AsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers

    16 Feb 2022

    6 minute read

    • Previous
    • 1
    • 2
    • Next
    • Follow:
    • Feed
    © 2025 Abdallah Elnoty. Powered by Jekyll & Minimal Mistakes.