Introducing NyxEngine
April 12, 2010

Introducing NyxEngine

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. When it comes to digital steganography no stone should be left unturned in the search for viable hidden data. Although digital steganography is commonly used to hide data inside multimedia files, a similar approach can be used to hide data in archives as well.

Read More
Unpacking archives with TitanEngine
April 5, 2010

Unpacking archives with TitanEngine

TitanEngine is primarily envisioned as a portable executable file format unpacker and handling framework. However due to its static unpacking functions it can be used to unpack other file format types such as installers and archives. That is why today we are showing the utilization of the new static unpacking functions that will be available with the next update. We are discussing the upcoming features which is something we generally like to avoid but it is for a good reason.

Read More
Hiding in the Familar
April 3, 2010

Hiding in the Familar

Steganography is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity. Nyx also searches for viable hidden data that was intentionally cloaked from sight using steganographic principles.

Read More
TitanEngine training course at BlackHat
March 29, 2010

TitanEngine training course at BlackHat

In addition to TitanEngine course in Montreal on Recon there is another course that will be teaching you how to use the TitanEngine. So, if you are in Vegas for BlackHat you might want to check out Advanced Malware Deobfuscation training by Jason Geffner & Scott Lambert. Here is the course description:

Read More
BlackHat recap
August 12, 2009

BlackHat recap

We took some down time after Black Hat and are now ready to keep churning some new and exciting code. First of all, thanks to all that have made it to our talk and have been asking us in hallways at Black Hat and Defcon to give them demos. Quite a few blog entries and tweets have covered our talk.

Read More

Pages