Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.kong.fyi/llms.txt

Use this file to discover all available pages before exploring further.

Coming Soon

We’re preparing additional case studies analyzing real-world malware and backdoors with Kong. Check back soon for deep dives into:
  • Malware triage workflows
  • CTF binary analysis
  • Firmware reverse engineering
In the meantime, see the XZ Backdoor case study for a complete walkthrough of Kong analyzing a real-world supply chain implant.
Last modified on March 20, 2026