<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
    <channel>
      <title>Safari</title>
      <link>https://0x4f776c.github.io</link>
      <description>Last 10 notes on Safari</description>
      <generator>Quartz -- quartz.jzhao.xyz</generator>
      <item>
    <title>PlugX (THOR Variant)</title>
    <link>https://0x4f776c.github.io/Malware-Analysis/Live-Sample/PlugX-(THOR-Variant)</link>
    <guid>https://0x4f776c.github.io/Malware-Analysis/Live-Sample/PlugX-(THOR-Variant)</guid>
    <description><![CDATA[ Dropper Basic Static Analysis IdentifierFile TypeSHA25680deed939a520696968335d1bb2a9fcce7053c0156f679ba261824d0a2d44967.exeEXE80deed939a520696968335d1bb2a9fcce7053c0156f679ba261824d0a2d44967 First-stage dropper is a 32-bit GUI Windows Executable. ]]></description>
    <pubDate>Sat, 25 Apr 2026 05:18:25 GMT</pubDate>
  </item><item>
    <title>Bossfight-wannacry.exe</title>
    <link>https://0x4f776c.github.io/Malware-Analysis/PMAT/Bossfight-wannacry.exe</link>
    <guid>https://0x4f776c.github.io/Malware-Analysis/PMAT/Bossfight-wannacry.exe</guid>
    <description><![CDATA[ Basic Static Analysis Binary information Binary is a 32-bit executable IAT Several suspicious imports, may be one of the following type of malware: C2 agent RAT ransomware Strings Seems to be using SMB Multiple IP addresses of interest Section Does not seem to be packed as raw size is similar to vir... ]]></description>
    <pubDate>Sat, 04 Apr 2026 16:55:50 GMT</pubDate>
  </item><item>
    <title>Dropper.installer.msi</title>
    <link>https://0x4f776c.github.io/Malware-Analysis/PMAT/Dropper.installer.msi</link>
    <guid>https://0x4f776c.github.io/Malware-Analysis/PMAT/Dropper.installer.msi</guid>
    <description><![CDATA[ notely-setup-x64.msi Basic static analysis Binary information Hashes λ md5sum.exe notely-setup-x64.msi f13923cdcb65993835c8fc538e03d131 *notely-setup-x64.msi λ sha1sum.exe notely-setup-x64.msi 3dc0d8a6bd194b2cf54ddf8822895fc03bf4baa4 *notely-setup-x64.msi λ sha256sum.exe notely-setup-x64.msi 1866b0e... ]]></description>
    <pubDate>Sat, 04 Apr 2026 16:55:50 GMT</pubDate>
  </item><item>
    <title>Malware.stage0.exe</title>
    <link>https://0x4f776c.github.io/Malware-Analysis/PMAT/Malware.stage0.exe</link>
    <guid>https://0x4f776c.github.io/Malware-Analysis/PMAT/Malware.stage0.exe</guid>
    <description><![CDATA[ Basic Static Analysis (Malware.stage0.exe.malz) Binary information 32-bit binary File hashes md5sum.exe Malware.stage0.exe.malz 6d8895c63a77ebe5e49b656bdefdb822 *Malware.stage0.exe.malz sha1sum.exe Malware.stage0.exe.malz de8fb0deb6a0ac1f621950270f0ee312357401d7 *Malware.stage0.exe.malz sha256sum.ex... ]]></description>
    <pubDate>Sat, 04 Apr 2026 16:55:50 GMT</pubDate>
  </item><item>
    <title>putty.exe</title>
    <link>https://0x4f776c.github.io/Malware-Analysis/PMAT/putty.exe</link>
    <guid>https://0x4f776c.github.io/Malware-Analysis/PMAT/putty.exe</guid>
    <description><![CDATA[ Basic Static Analysis File hashes sha256sum.exe putty.exe 0c82e654c09c8fd9fdf4899718efa37670974c9eec5a8fc18a167f93cea6ee83 *putty.exe sha1sum.exe putty.exe c6a97b63fbd970984b95ae79a2b2aef5749ee463 *putty.exe md5sum.exe putty.exe 334a10500feb0f3444bf2e86ab2e76da *putty.exe VirusTotal Detected as troj... ]]></description>
    <pubDate>Sat, 04 Apr 2026 16:55:50 GMT</pubDate>
  </item><item>
    <title>unknown.exe</title>
    <link>https://0x4f776c.github.io/Malware-Analysis/PMAT/unknown.exe</link>
    <guid>https://0x4f776c.github.io/Malware-Analysis/PMAT/unknown.exe</guid>
    <description><![CDATA[ Basic Static Analysis Binary information File hashes md5sum.exe unknown.exe.malz b9497ffb7e9c6f49823b95851ec874e3 *unknown.exe.malz sha1sum.exe unknown.exe.malz 6c8f50040545d8cd9af4b51564de654266e592e3 *unknown.exe.malz sha256sum.exe unknown.exe.malz 3aca2a08cf296f1845d6171958ef0ffd1c8bdfc3e48bdd34a... ]]></description>
    <pubDate>Sat, 04 Apr 2026 16:55:50 GMT</pubDate>
  </item><item>
    <title>Redirect</title>
    <link>https://0x4f776c.github.io/safari</link>
    <guid>https://0x4f776c.github.io/safari</guid>
    <description><![CDATA[ To whomever that’s viewing this page, I’ve moved the base of the website to 0x4f776c.github.io/. Click on the link or here to get redirected. ]]></description>
    <pubDate>Wed, 25 Mar 2026 06:44:59 GMT</pubDate>
  </item><item>
    <title>Home</title>
    <link>https://0x4f776c.github.io/</link>
    <guid>https://0x4f776c.github.io/</guid>
    <description><![CDATA[  $ whoami Lee Chun Hao $ cat todo.txt [+] OSEP by 12 May 2026 $ | @keyframes pulse { 0% { opacity: 0; } 50% { opacity: 1; } 100% { opacity: 0; } } Technical Expertise Malware Analysis &amp; RE: Expert in analysing active malware families for signature generation and defence tooling. ]]></description>
    <pubDate>Tue, 24 Mar 2026 07:08:39 GMT</pubDate>
  </item><item>
    <title>PIE TIME</title>
    <link>https://0x4f776c.github.io/CTF/PWN/PicoCTF/PIE-TIME</link>
    <guid>https://0x4f776c.github.io/CTF/PWN/PicoCTF/PIE-TIME</guid>
    <description><![CDATA[ Executive Summary Challenge: Overwrite the return address to call win(). Obstacle: PIE is enabled, meaning addresses change every execution. ]]></description>
    <pubDate>Sat, 21 Mar 2026 17:26:41 GMT</pubDate>
  </item>
    </channel>
  </rss>