877.791.9571 |

About the Author:

Andrew is currently a contract security researcher for InfoSec Institute. He has worked in various network and systems installation and support capacities, but his passion is security. He has contributed video to securitytube.net and has multiple speaking engagements at conferences both domestic and abroad. The current focus of his research is anti-virus bypass and reverse engineering compiled binaries.

Dockerizing a Sample GUI Application: Case Study

The goal for this article is a sprint from never using Docker to using it to deploy a GUI application that only has a console deployment pattern for Docker.

Why […]

Writing Self-Modifying Code Part 3: Antivirus Evasion

This is the third article in a series on the topic of self-modifying code.

Part 1 is here: Writing Self-Modifying Code Part 1: C Hellow Word with RWX and In-Line […]

Writing Self-Modifying Code Part 2: Using extended assembly – Practice

Part 1 is here: http://resources.infosecinstitute.com/writing-self-modifying-code-part-1/

All the code for this tutorial is on github. Links for particular components are interspersed, or you can just pull the repo. It seems my […]

Writing Self-modifying Code Part 1: C Hello world with RWX and in-line assembly

To follow along with this tutorial, download all source files here

In the first part of this tutorial, we’ll be making a basic C scaffold and getting read, write, and […]