Welcome to my blog
Welcome to my blog! I’m petikvx, a Junior Malware Researcher focused on understanding malware mechanics and cybersecurity.
About Me
I specialize in malware analysis and reverse engineering, working on various research projects including:
- Malware reverse engineering - Analyzing ransomware, trojans, and other malicious software
- Source code analysis - Decompiling and understanding malware behavior (MSIL-Ransom, various ransomware families)
- Malware analysis tools - Developing and curating tools for security research
- Vintage malware archiving - Preserving and documenting malware from 2000-2002 era
You can find my work on:
- GitHub: github.com/petikvx (71+ repositories)
- Twitter/X: @petikvx
- Discord: petikvx#9815
What You’ll Find Here
This blog will cover:
- Malware analysis reports - Deep dives into specific malware samples
- Reverse engineering tutorials - Techniques and methodologies
- Security research - Findings and observations from my investigations
- Tool reviews - Analysis tools and frameworks for malware research
- Historical malware documentation - Insights from vintage malware archives
My Notable Projects
Some of my key repositories include:
- MSIL-Ransom - Source code analysis of MSIL ransomware (⭐7)
- petikvx-archiver - Archive of all my works from 2000-2002 (⭐7)
- malwares-analysis-tools - Curated collection of malware analysis tools (⭐20)
- ransom-source-code - Reverse engineering of different ransomware families (⭐4)
How This Blog Works
This blog is built with Jekyll and GitHub Pages, using a custom Matrix/Cybersecurity theme designed for security researchers. All articles are written in Markdown for easy documentation and code sharing.
1
2
3
4
5
6
7
8
---
layout: post
title: "Malware Analysis Report"
date: 2025-11-20
tags: [malware, analysis, reverse-engineering]
---
Your analysis content here...
Feel free to reach out on Twitter/X or Discord if you have questions, suggestions, or want to collaborate on security research!
“The best way to predict the future is to study the past.” – Applied to malware research: understanding historical threats helps us prevent future ones.