This document describes the analysis of the Shylock/Caphaw.D Windows trojan and Snakso.A Linux rootkit using the radare2 reverse engineering framework. Key functions and techniques of each sample are dissected, such as the Shylock trojan obtaining the process heap, modifying memory permissions, and installing persistence via the registry. The Snakso rootkit is found to hide processes, patch kernel functions, and decrypt strings. Radare2 is used to visualize disassembly, identify strings, cross-references, and analyze file formats, imports, and execution flow to understand the malware behavior.