Skip to content

0xca7/blog

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

4 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Blog Articles

Extracted articles from 0xca7.github.io, organized by section. Each folder contains the article markdown and all referenced images/PDFs with corrected relative paths.


blogs/

# Folder Article Synopsis
01 01_libopencm3_project ARM Cortex-M3 libopencm3 Project Documenting a mini-project on the STM32 Blue Pill using libopencm3: fixed-point arithmetic (Q11.4), I2C readout of a TMP102 temperature sensor, timer interrupts, USART output, and a moving average filter.
02 02_ghidrathon_unicorn Ghidrathon + Unicorn Engine + Capstone A Ghidra Python3 script combining Ghidrathon, the Unicorn emulator and Capstone to build a mini ARM32 emulator inside Ghidra: select code, set registers interactively, and trace execution instruction-by-instruction with register and stack dumps.
03 03_aoma The Art of Malware Analysis – Course Review Short review of Ahmed's "The Art of Malware Analysis" course: covers basic to intermediate malware analysis, x86 assembly, config extraction, YARA rules, and task automation with real-world samples. Rated 10/10.
04 04_aarch64_cpp Reversing AARCH64 C++ Binaries PDF note set covering reverse engineering of C++ binaries compiled for AArch64/ARM64: basic classes, pure virtual methods, abstract classes, templates, and stripped binaries.
05 05_rustre1 Rust Reversing – Iterators Walkthrough of reversing Rust iterator-based XOR encryption in both debug and release builds using Ghidra, showing how iter_mut/for_each/fold patterns appear in assembly and how the compiler optimises them.
06 06_bggp5 BGGP5 BGGP5 entry: a CMake-based file downloader (CMakeLists.txt, 283 bytes) that fetches the challenge URL and prints its contents using FetchContent and a bash cat command.
07 07_rustre2 Rust Reversing – obfstr Crate Deep-dive into reverse engineering binaries compiled with the obfstr crate (v0.4.4): explains the XOR keystream generation, xref obfuscation, and how to statically recover obfuscated strings from both release and debug builds.

notes/

# Folder Article Synopsis
01 01_calling_conventions Calling Conventions Quick-reference overview of x86/x86_64 calling conventions on Windows (stdcall, x64 ABI) and Linux (System V AMD64 ABI), covering register usage, argument passing, and return values.
02 02_docker Docker Notes Practical Docker cheat-sheet: installation, pulling images, running and managing containers, volumes, networking, and common commands for day-to-day use.
03 03_mount_jffs2 Mount JFFS2 Filesystems Shell script and step-by-step guide for mounting JFFS2 filesystem images extracted from firmware blobs via binwalk, using a simulated MTD flash device.
04 04_virt-manager-arm Debian ARM/aarch64 in virt-manager Step-by-step guide for running a Debian ARM or AArch64 virtual machine on an x86-64 host using virt-manager and QEMU, including setup, installation, and network configuration.
05 05_pq_lattice Lattice Cryptography Notes Personal study notes on lattice-based (post-quantum) cryptography, provided as a PDF.
06 06_docker_emulation Firmware Emulation with Docker Guide to emulating foreign-architecture firmware (MIPS/ARM) inside Docker containers using QEMU user-mode static binaries, expanding on a conference talk with ARM-specific examples.
07 07_mount_ubifs Mounting UBIFS Command sequence for mounting UBIFS images on Linux: simulating a NAND device with nandsim, formatting with ubiformat, attaching via ubiattach, and mounting.
08 08_extract_cramfs Extract cramfs One-page reference for extracting cramfs filesystem images: detecting endianness with file, byte-swapping big-endian images with cramfsswap, and extracting with fsck.cramfs.
09 09_crust_of_rust Crust of Rust – Notes Study notes from Jon Gjengset's "Crust of Rust" video series, covering memory ordering and atomics, lifetimes, and smart pointers with interior mutability.

malware/

# Folder Article Synopsis
01 01_malware_analysis Collection of Malware Analysis Writeups Index page linking to five PDF analysis reports: Blackguard (.NET infostealer), Redline Stealer, a Go-based Linux stealer, a Linux botnet, and STOP/DJVU ransomware unpacking.
02 02_blackguard Blackguard Stealer Analysis of Blackguard, a .NET infostealer. Full writeup in the accompanying PDF.
03 03_redline Redline Stealer Analysis Analysis of the Redline credential stealer. Full writeup in the accompanying PDF.
04 04_golang_stealer Golang Stealer Analysis of a stealer written in Go that targets Linux systems. Full writeup in the accompanying PDF.
05 05_linux_botnet Linux Botnet Analysis Analysis of a botnet targeting Linux systems. Full writeup in the accompanying PDF.
06 06_stop_djvu Stop/DJVU Analysis Unpacking walkthrough for the STOP/DJVU ransomware, which bundles stealer malware. Full writeup in the accompanying PDF.
07 07_pebwalk_notes Notes on PEB Walking Detailed notes on PEB (Process Environment Block) walking and API hashing as seen in the BLISTER loader: annotated assembly walkthrough of the technique and curated reference links.
08 08_ca7vsapt Battling with APT Malware Replication notes for an AhnLab APT malware report, adding two original findings: a custom string obfuscation routine (beyond simple XOR) and additional reversing details on the dropper component.
09 09_wineloader Wineloader Analysis notes supplementing the Zscaler SPIKEDWINE/Wineloader report: static decryption of the RC4-encrypted main payload, string decryption, and C2 URL recovery, with annotated code snippets aimed at beginners.
10 10_latrodectus Latrodectus Analysis of the Latrodectus malware loader, focusing on its CRC32-based API hashing scheme used to hide imported Windows API functions.

About

my blog

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors