Articles in Malware Analysis & Reverse Engineering
Filter by category
Malware Analysis & Reverse EngineeringAdvanced
ArticleMalware Analysis & Reverse Engineering
My Experience on How RAT Communication Works
In this article, I share my experience and insights on how Remote Access Trojan (RAT) communication works. How RATs establish a TLS connection over port 443, creating an evasion technique to bypass network security measures.
Mar 15, 2026
securityadvancedmalware_and_reverse_engineeringrat
Malware Analysis & Reverse EngineeringAdvanced
ArticleMalware Analysis & Reverse Engineering
Defeating Self-Modifying Code in VM-Protected Binaries: A Practical Unpacking Workflow with x64dbg Scriptable Breakpoints
Commercial protectors like Themida and VMProtect do not simply compress or encrypt code — they *architecturally replace* it.
Feb 18, 2026
tutorialsecurityadvancedmalware_and_re