The (Cyber) Circus: Malware Reverse Engineering In Reality by Michael Goedeker


Everyone by now is hearing about the attacks on Ukraine's critical infrastructure, using our research and also free framework (, Tor detection and research to protect against the attacks that we researched and found as well as documented here and in various forums and security conventions long before Cys Centrum, iSight, etc. regurgitated old research and sold it as new.... With some of the reports and incorrect information I read recently I think it makes sense to discuss what really happens in Malware Research and Reverse Engineering because I am seeing way too much fluff on the topic lately. I also want to set the correct expectations on anyone saying they do this but use dubious or highly unethical ways of collecting data. When reading through reports and findings I always ask myself how people collect information, verify it, protect it against tampering and also discuss the findings. These are all....

Notify of
1 Comment
Oldest Most Voted
Inline Feedbacks
View all comments
Amanda Franky
6 months ago

A great hacker is really worthy of good recommendation , Henry
really help to get all the evidence i needed against my husband and
and i was able to confront him with this details from this great hacker
to get an amazing service done with the help ,he is good with what he does and the charges are affordable, I think all I owe him is publicity for a great work done via, Henryclarkethicalhacker at g mail com, and you can text, call him on whatsapp him on +12014305865, or +17736092741, 

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.
What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.