Jun 16, 2025

Static Data Exploration of Malware and Goodware Samples

Exploring our dataset of malware and benign binaries to find patterns, anomalies, and generally seeing what we have.

Aug 18, 2022

Maelstrom #6: Working with AMSI and ETW for Red and Blue

Endpoint Protection and Response is complicated for both offence and defence. In this blog we take a look at AMSI and ETW from both perspectives.

Aug 18, 2022

Maelstrom #7: Static OpSec Review

Breaking down the Maelstrom DLL and Loader to identify and discuss remediations for indicators-of-compromise.

Jul 11, 2022

Maelstrom #3: Building the Team Server

Exploring the development of a C2 Team Server, discussing common challenges, stealth techniques, and the complexities of identifying malicious network traffic.

Jul 11, 2022

Maelstrom #5: EDR Kernel Callbacks, Hooks, and Call Stacks

Endpoint Protection and Response is complicated for both offence and defence. In this blog we take a look at Kernel Callbacks, Hooks, and Thread Call Stacks from both perspectives.

Jul 11, 2022

Maelstrom #4: Writing a C2 Implant

In this blog, we will discuss how to write a C2 implant for the modern era. We will look at the history of offensive techniques and the progress of defence.

Jun 13, 2022

Maelstrom #2: The C2 Architecture

A look into the design choices behind the C2, along side some design concepts to keep it stable, and the workflow smooth.

Jun 13, 2022

Bluffy the AV Slayer: Bypassing Static Detection

Playing with AV evasion techniques by using formats such as CSS, SVG, etc.

Jun 13, 2022

Maelstrom #1: An Introduction

Throughout this series, we will be slowly building out a Command & Control Framework and discussing common implementation, IOCs, and TTPs.