Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Cyber Assassin
  • Malware Analysis
  • Reverse
  • CTF
  • Tutorials
  • All Categories
    Cyber Assassin

    Cyber Assassin

    Computer engineer interested in reverse engineering and malware analysis

    • Egypt
    • Email
    • Twitter
    • Facebook
    • LinkedIn
    • GitHub

    Recent posts

    CTF

    Arab Security Cyber WarGames Finals phase 2025

    Writeup for ASCWG Reverse challenges ...

    09 Sep 2025

    24 minute read

    CTF

    Arab Security Cyber WarGames Qualification phase 2025

    Writeup for ASCWG Reverse challenges ...

    02 Aug 2025

    5 minute read

    Malware-Analysis

    Xworm

    Xworm Analysis Report...

    26 Jan 2025

    27 minute read

    Malware-Analysis

    Phobos Ransomware

    Phobo Ransomware Analysis Report...

    20 Jan 2025

    17 minute read

    CTF

    ICMT CSC2 Finals

    Writeup for ICMT Reverse challenges ...

    29 Jul 2024

    9 minute read

    Tutorials

    PowerShell

    Obfuscated PowerShell walk-through...

    25 Jul 2024

    6 minute read

    CTF

    ICMT CSC2

    Writeup for ICMT Reverse challenges ...

    27 Jun 2024

    2 minute read

    Malware-Analysis

    IcedID

    IcedID Dropper Analysis...

    17 Apr 2024

    8 minute read

    • Previous
    • 1
    • 2
    • 3
    • Next
    • Follow:
    • Twitter
    • Feed
    © 2025 Cyber Assassin. Powered by Jekyll & Minimal Mistakes.