Skip to main content

Coming Soon

We’re preparing additional case studies analyzing real-world malware and backdoors with Kong. Check back soon for deep dives into:
  • Malware triage workflows
  • CTF binary analysis
  • Firmware reverse engineering
In the meantime, see the XZ Backdoor case study for a complete walkthrough of Kong analyzing a real-world supply chain implant.
Last modified on March 20, 2026