Ilan Kalendarov

Exploring Nim language - Writing a ransomware

Introduction During one of my engagements I needed to encrypt an asset on the domain so, I started to explore what would be the simplest yet not easy to decrypt way of doing so. I came by the Ni...

Offensive API Hooking

Introduction Hooking is not a new concept as we know by now, many AV/EDR vendors use this technique to monitor suspicious API calls. In this blog post, we’ll explore API hooking but from the off...