0xrafasec
HomeCVE deep-divesAll articlesToolsLearningAbout
HomeCVE deep-divesAll articlesToolsLearningAbout

Articles in Malware Analysis & Reverse Engineering

Filter by category

AllCVE AnalysisDecentralized Systems SecurityDetection & DefenseHardware & Firmware SecurityMalware Analysis & Reverse EngineeringMethodology & MindsetNetwork & InfrastructureNotebookTutorialsWeb App & API Security
Malware Analysis & Reverse EngineeringAdvanced
ArticleMalware Analysis & Reverse Engineering

My Experience on How RAT Communication Works

In this article, I share my experience and insights on how Remote Access Trojan (RAT) communication works. How RATs establish a TLS connection over port 443, creating an evasion technique to bypass network security measures.

Mar 15, 2026
securityadvancedmalware_and_reverse_engineeringrat
Malware Analysis & Reverse EngineeringAdvanced
ArticleMalware Analysis & Reverse Engineering

Defeating Self-Modifying Code in VM-Protected Binaries: A Practical Unpacking Workflow with x64dbg Scriptable Breakpoints

Commercial protectors like Themida and VMProtect do not simply compress or encrypt code — they *architecturally replace* it.

Feb 18, 2026
tutorialsecurityadvancedmalware_and_re

Search

Categories

  • CVE Analysis
  • Decentralized Systems Security
  • Detection & Defense
  • Hardware & Firmware Security
  • Malware Analysis & Reverse Engineering
  • Methodology & Mindset
  • Network & Infrastructure
  • Notebook
  • Tutorials
  • Web App & API Security

Connect

0xrafasec

Security research, decoded. CVE deep-dives, vulnerability analysis, ethical hacking. No fluff.

Links

  • Home
  • All articles
  • Tools
  • Learning
  • About
  • RSS Feed

Connect

Subscribe to the newsletter

Get the latest security research and CVE analysis delivered to your inbox.

© 2026 0xrafasec. All rights reserved.