logo
Defence blues
THM Rooms
  • Red wilds
  • Privacy greenhouse
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
      • Golem Trust Computing Ltd.
      • Department of Silent Stability
      • The Home for Bewildered Beasts of Legend
      • Stormforge
      • Blue team @SOC
      • Reverse engineering for defenders
        • Binary formats
        • Cracking nuts
        • Malware analysis
        • THM Rooms
          • Analysing malicious pdfs
          • Analysing malicious Microsoft Office macros
          • I hope you packed your bags
          • THM Dunkle Materie
        • THM Rooms
          • Analysing malicious pdfs
          • Analysing malicious Microsoft Office macros
          • I hope you packed your bags
          • THM Dunkle Materie
      • Blue team for dev
      • Blue team @Home
      • Bulletproofing servers
      • Honeytech for humans

    THM RoomsΒΆ

    • Identifying and analysing malicious payloads of various formats embedded in PDFs, EXEs and Microsoft Office Macros.

    • Identifying obfuscated code and packed files, and analysing these.

    • Analysing the memory dump of a PC that became infected with the Jigsaw ransomware in the real-world using Volatility.

    Practice with real-world example cases.

    • Analysing malicious pdfs
    • Analysing malicious Microsoft Office macros
    • I hope you packed your bags
    • THM Dunkle Materie
    2026-03-23 12:45
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7