UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NEW PENTEST TUTORIALS & TOOLS :

- [WeebDNS - DNS Enumeration With Asynchronicity](http://feedproxy.google.com/~r/PentestTools/~3/aj8iNTv76KM/weebdns-dns-enumeration-with.html)

- [RedGhost v3.0 - Linux Post Exploitation Framework Written In Bash Designed To Assist Red Teams In Persistence, Reconnaissance, Privilege Escalation And Leaving No Trace](http://feedproxy.google.com/~r/PentestTools/~3/r5pc37rjXcE/redghost-v30-linux-post-exploitation.html)

- [Recon-ng v5.0.0 - Open Source Intelligence Gathering Tool Aimed At Reducing The Time Spent Harvesting Information From Open Sources](http://feedproxy.google.com/~r/PentestTools/~3/aJ03REwtdTs/recon-ng-v500-open-source-intelligence.html)

- [Uncompyle6 - A Cross-Version Python Bytecode Decompiler](http://feedproxy.google.com/~r/PentestTools/~3/4BqkUdipfRA/uncompyle6-cross-version-python.html)

- [OSXCollector - A Forensic Evidence Collection & Analysis Toolkit For OS X](http://feedproxy.google.com/~r/PentestTools/~3/iIrDdkpfB3I/osxcollector-forensic-evidence.html)

- [Vulnado - Purposely Vulnerable Java Application To Help Lead Secure Coding Workshops](http://feedproxy.google.com/~r/PentestTools/~3/3GWRhgE0P_Y/vulnado-purposely-vulnerable-java.html)

- [Orbit v2.0 - Blockchain Transactions Investigation Tool](http://feedproxy.google.com/~r/PentestTools/~3/wMLiz7Gx-5I/orbit-v20-blockchain-transactions.html)

- [Cloudcheck - Checks Using A Test String If A Cloudflare DNS Bypass Is Possible Using CloudFail](http://feedproxy.google.com/~r/PentestTools/~3/DUH7fx0yK74/cloudcheck-checks-using-test-string-if.html)

- [grapheneX - Automated System Hardening Framework](http://feedproxy.google.com/~r/PentestTools/~3/1c8Pd15Q3f0/graphenex-automated-system-hardening.html)

- [O365-Attack-Toolkit - A Toolkit To Attack Office365](http://feedproxy.google.com/~r/PentestTools/~3/5YBArQY7xbI/o365-attack-toolkit-toolkit-to-attack.html)

- [Pyattck - A Python Module To Interact With The Mitre ATT&CK Framework](http://feedproxy.google.com/~r/PentestTools/~3/M1JRpVeqmzc/pyattck-python-module-to-interact-with.html)

- [Evil-Winrm - The Ultimate WinRM Shell For Hacking/Pentesting](http://feedproxy.google.com/~r/PentestTools/~3/vNwEzZybqkk/evil-winrm-ultimate-winrm-shell-for.html)

- [Airopy - Get Clients And Access Points](http://feedproxy.google.com/~r/PentestTools/~3/_2hr62fH7Rc/airopy-get-clients-and-access-points.html)

- [AMIRA - Automated Malware Incident Response & Analysis](http://feedproxy.google.com/~r/PentestTools/~3/n9b89NWONDo/amira-automated-malware-incident.html)

- [VulnWhisperer - Create Actionable Data From Your Vulnerability Scans](http://feedproxy.google.com/~r/PentestTools/~3/F0Myf7GiesM/vulnwhisperer-create-actionable-data.html)

- [Dockernymous - A Script Used To Create A Whonix Like Gateway/Workstation Environment With Docker Containers](http://feedproxy.google.com/~r/PentestTools/~3/WbwiCRF568Y/dockernymous-script-used-to-create.html)

- [HiddenEye - Modern Phishing Tool With Advanced Functionality (Android-Support-Available)](http://feedproxy.google.com/~r/PentestTools/~3/GTRsshv5Lcs/hiddeneye-modern-phishing-tool-with.html)

- [SUDO_KILLER - A Tool To Identify And Exploit Sudo Rules Misconfigurations And Vulnerabilities Within Sudo](http://feedproxy.google.com/~r/PentestTools/~3/grcbPtCQkyg/sudokiller-tool-to-identify-and-exploit.html)

- [Hvazard - Remove Short Passwords & Duplicates, Change Lowercase To Uppercase & Reverse, Combine Wordlists!](http://feedproxy.google.com/~r/PentestTools/~3/V6_EesPs7B0/hvazard-remove-short-passwords.html)

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ iο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ NEW TOP IPHONE SECRET KEYS :

*#06# – Displays IMEI

*3001#12345#* + β€œCall” – Accesses a hidden Field Test menu

*#43# + β€œCall” – Displays call waiting status

*43# + β€œCall” – Enables call waiting

#43# + β€œCall” – Disables call waiting

*#21# – Displays call forwarding status

##002# + β€œCall” – Disables all call forwarding

*33*pin# – Enables call barring

#33*pin# – Disables call barring

#31#phone-number + β€œCall” – Blocks caller ID for the current phone call

*3370# + β€œCall” – Enables β€œEnhanced Full Rate” and improves voice quality on GSM networks (may impact battery life)

*#5005*7672# + β€œCall” – Displays your carrier’s message center phone number

> Here are two notable ones β€” the first will work on most Android phones and the second will work on all Android phones:

*#*#4636#*#* – Accesses a hidden test menu with sections for network, battery information and usage stats.

(powered by wiki sources)
@iUndercode
▁ β–‚ β–„ iο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 #Anonymizers

Web traffic anonymizers for analysts.

[Anonymouse.org](http://anonymouse.org/) - A free, web based anonymizer.

OpenVPN - VPN software and hosting solutions.

[Privoxy](http://www.privoxy.org/) - An open source proxy server with some
privacy features.

Tor - The Onion Router, for browsing the web
without leaving traces of the client IP.


βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TOP #Malware

Malware samples collected for analysis.



[Contagio](
http://contagiodump.blogspot.com/) - A collection of recent
malware samples and analyses.

Exploit Database - Exploit and shellcode
samples.

[Infosec - CERT-PA](https://infosec.cert-pa.it/analyze/submission.html) - Malware samples collection and analysis.

InQuest Labs - Evergrowing searchable corpus of malicious Microsoft documents.

[Javascript Mallware Collection](https://github.com/HynekPetrak/javascript-malware-collection) - Collection of almost 40.000 javascript malware samples

Malpedia - A resource providing
rapid identification and actionable context for malware investigations.

[Malshare](https://malshare.com) - Large repository of malware actively
scrapped from malicious sites.

Open Malware Project - Sample information and
downloads. Formerly Offensive Computing.

[Ragpicker](https://github.com/robbyFux/Ragpicker) - Plugin based malware
crawler with pre-analysis and reporting functionalities

theZoo - Live malware samples for
analysts.

[Tracker h3x](http://tracker.h3x.eu/) - Agregator for malware corpus tracker
and malicious download sites.

vduddu malware repo - Collection of
various malware files and source code.

[VirusBay](https://beta.virusbay.io/) - Community-Based malware repository and social network.

ViruSign - Malware database that detected by
many anti malware programs except ClamAV.

[VirusShare](https://virusshare.com/) - Malware repository, registration
required.

VX Vault - Active collection of malware samples.

[Zeltser's Sources](https://zeltser.com/malware-sample-sources/) - A list
of malware sample sources put together by Lenny Zeltser.

Zeus Source Code - Source for the Zeus
trojan leaked in 2011.


βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Open Source #Threat Intelligence
#Tools for creating Malwares & resources :

Harvest and analyze IOCs.

[AbuseHelper](
https://github.com/abusesa/abusehelper) - An open-source
framework for receiving and redistributing abuse feeds and threat intel.

AlienVault Open Threat Exchange - Share and
collaborate in developing Threat Intelligence.

[Combine](https://github.com/mlsecproject/combine) - Tool to gather Threat
Intelligence indicators from publicly available sources.

Fileintel - Pull intelligence per file hash.

[Hostintel](https://github.com/keithjjones/hostintel) - Pull intelligence per host.

IntelMQ -
A tool for CERTs for processing incident data using a message queue.

[IOC Editor](https://www.fireeye.com/services/freeware/ioc-editor.html) -
A free editor for XML IOC files.

iocextract - Advanced Indicator
of Compromise (IOC) extractor, Python library and command-line tool.

[ioc_writer](https://github.com/mandiant/ioc_writer) - Python library for
working with OpenIOC objects, from Mandiant.

MalPipe - Malware/IOC ingestion and
processing engine, that enriches collected data.

[Massive Octo Spice](https://github.com/csirtgadgets/massive-octo-spice) -
Previously known as CIF (Collective Intelligence Framework). Aggregates IOCs
from various lists. Curated by the
[CSIRT Gadgets Foundation](
http://csirtgadgets.org/collective-intelligence-framework).

MISP - Malware Information Sharing
Platform curated by The MISP Project.

[Pulsedive](https://pulsedive.com) - Free, community-driven threat intelligence platform collecting IOCs from open-source feeds.

PyIOCe - A Python OpenIOC editor.

[RiskIQ](https://community.riskiq.com/) - Research, connect, tag and
share IPs and domains. (Was PassiveTotal.)

threataggregator -
Aggregates security threats from a number of sources, including some of

βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#MALWARES Threat intelligence and IOC resources.

[Autoshun](
https://www.autoshun.org/) ([list](https://www.autoshun.org/files/shunlist.csv)) -
Snort plugin and blocklist.

Bambenek Consulting Feeds -
OSINT feeds based on malicious DGA algorithms.

[Fidelis Barncat](https://www.fidelissecurity.com/resources/fidelis-barncat) -
Extensive malware config database (must request access).

CI Army (list) -
Network security blocklists.

[Critical Stack- Free Intel Market](https://intel.criticalstack.com) - Free
intel aggregator with deduplication featuring 90+ feeds and over 1.2M indicators.

Cybercrime tracker - Multiple botnet active tracker.

[FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise
shared publicly by FireEye.

FireHOL IP Lists - Analytics for 350+ IP lists
with a focus on attacks, malware and abuse. Evolution, Changes History,
Country Maps, Age of IPs listed, Retention Policy, Overlaps.

[HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.

hpfeeds - Honeypot feed protocol.

[Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.

InQuest REPdb - Continuous aggregation of IOCs from a variety of open reputation sources.

[InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.

Internet Storm Center (DShield) - Diary and
searchable incident database, with a web API.
(unofficial Python library).

[malc0de](http://malc0de.com/database/) - Searchable incident database.

Malware Domain List - Search and share
malicious URLs.

[MetaDefender Threat Intelligence Feed](https://www.opswat.com/developers/threat-intelligence-feed) -
List of the most looked up file hashes from MetaDefender Cloud.

OpenIOC -
Framework for sharing threat intelligence.

[Proofpoint Threat Intelligence](https://www.proofpoint.com/us/products/et-intelligence) -
Rulesets and more. (Formerly Emerging Threats.)

Ransomware overview

βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A list of ransomware overview with details, detection and prevention !!

[STIX - Structured Threat Information eXpression](http://stixproject.github.io)
Standardized language to represent and share cyber threat information.
Related efforts from [MITRE](
https://www.mitre.org/):

- [CAPEC - Common Attack Pattern Enumeration and Classification](
http://capec.mitre.org/)

- [CybOX - Cyber Observables eXpression](
http://cyboxproject.github.io)

- [MAEC - Malware Attribute Enumeration and Characterization](
http://maec.mitre.org/)

- [TAXII - Trusted Automated eXchange of Indicator Information](
http://taxiiproject.github.io)

SystemLookup - SystemLookup hosts a collection of lists that provide information on
the components of legitimate and potentially unwanted programs.

[ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat
intelligence, with search.

threatRECON - Search for indicators, up to 1000
free per month.

[Yara rules](https://github.com/Yara-Rules/rules) - Yara rules repository.


ZeuS Tracker - ZeuS
blocklists.

βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

#Detection and Classification
#MALWARES 2020

Antivirus and other malware identification tools

[AnalyzePE](
https://github.com/hiddenillusion/AnalyzePE) - Wrapper for a
variety of tools for reporting on Windows PE files.

Assemblyline - A scalable
distributed file analysis framework.

[BinaryAlert](https://github.com/airbnb/binaryalert) - An open source, serverless
AWS pipeline that scans and alerts on uploaded files based on a set of
YARA rules.

chkrootkit - Local Linux rootkit detection.

[ClamAV](http://www.clamav.net/) - Open source antivirus engine.

Detect It Easy(DiE) - A
program for
determining types of files.

[Exeinfo PE](http://exeinfo.pe.hu/) - Packer, compressor detector, unpack
info, internal exe tools.

ExifTool - Read, write and
edit file metadata.

[File Scanning Framework](https://github.com/EmersonElectricCo/fsf) -
Modular, recursive file scanning solution.

Generic File Parser - A Single Library Parser to extract meta information,static analysis and detect macros within the files.

[hashdeep](https://github.com/jessek/hashdeep) - Compute digest hashes with
a variety of algorithms.

HashCheck - Windows shell extension
to compute hashes with a variety of algorithms.

[Loki](https://github.com/Neo23x0/Loki) - Host based scanner for IOCs.

Malfunction - Catalog and
compare malware at a function level.

[Manalyze](https://github.com/JusticeRage/Manalyze) - Static analyzer for PE
executables.

MASTIFF - Static analysis
framework.

[MultiScanner](https://github.com/mitre/multiscanner) - Modular file
scanning/analysis framework

Nauz File Detector(NFD) - Linker/Compiler/Tool detector for Windows, Linux and MacOS.

[nsrllookup](https://github.com/rjhansen/nsrllookup) - A tool for looking
up hashes in NIST's National Software Reference Library database.

packerid - A cross-platform
Python alternative to PEiD.

[PE-bear](https://hshrzd.wordpress.com/pe-bear/) - Reversing tool for PE
files.

PEframe - PEframe is an open source tool to perform static analysis on Portable Executable malware and malicious MS Office documents.

[PEV](http://pev.sourceforge.net/) - A multiplatform toolkit to work with PE
files, providing feature-rich tools for proper analysis of suspicious binaries.

PortEx - Java library to analyse PE files with a special focus on malware analysis and PE malformation robustness.

[Quark-Engine](https://github.com/quark-engine/quark-engine) - An Obfuscation-Neglect Android Malware Scoring System

Rootkit Hunter - Detect Linux rootkits.

[ssdeep](https://ssdeep-project.github.io/ssdeep/) - Compute fuzzy hashes.

totalhash.py -
Python script for easy searching of the TotalHash.cymru.com
database.

ENJOY β€οΈπŸ‘πŸ»
βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
x3 Bins For Amazon Prime Videoβœ…

Bin : 442756103622xxxx
442756152271xxxx
442756161628xxxx

Date: 01/24
CVV : 067
IP : USA πŸ‡ΊπŸ‡Έ
Zip Code : 11213
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Online #Scanners and #Sandboxes topic

Web-based multi-AV scanners, and malware sandboxes for automated analysis.


[anlyz.io](https://sandbox.anlyz.io/) - Online sandbox.

any.run - Online interactive sandbox.

[AndroTotal](https://andrototal.org/) - Free online analysis of APKs
against multiple mobile antivirus apps.

AVCaesar - Malware.lu online scanner and
malware repository.

[BoomBox](https://github.com/nbeede/BoomBox) - Automatic deployment of Cuckoo
Sandbox malware lab using Packer and Vagrant.

Cryptam - Analyze suspicious office documents.

[Cuckoo Sandbox](https://cuckoosandbox.org/) - Open source, self hosted
sandbox and automated analysis system.

cuckoo-modified - Modified
version of Cuckoo Sandbox released under the GPL. Not merged upstream due to
legal concerns by the author.

[cuckoo-modified-api](https://github.com/keithjjones/cuckoo-modified-api) - A
Python API used to control a cuckoo-modified sandbox.

DeepViz - Multi-format file analyzer with
machine-learning classification.

[detux](https://github.com/detuxsandbox/detux/) - A sandbox developed to do
traffic analysis of Linux malwares and capturing IOCs.

DRAKVUF - Dynamic malware analysis

ENJOY β€οΈπŸ‘πŸ»
βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Domain Analysis Topic resources 2020

Inspect domains and IP addresses.


[AbuseIPDB](https://www.abuseipdb.com/) - AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet.

badips.com - Community based IP blacklist service.

[boomerang](https://github.com/EmersonElectricCo/boomerang) - A tool designed for consistent and safe capture of off network web resources.

Cymon - Threat intelligence tracker, with IP/domain/hash search.

[Desenmascara.me](http://desenmascara.me) - One click tool to retrieve as much metadata as possible for a website and to assess its good standing.

Dig - Free online dig and other
network tools.

[dnstwist](https://github.com/elceef/dnstwist) - Domain name permutation
engine for detecting typo squatting, phishing and corporate espionage.

IPinfo - Gather information
about an IP or domain by searching online resources.


[mailchecker](https://github.com/FGRibreau/mailchecker) - Cross-language
temporary email detection library.

MaltegoVT - Maltego transform
for the VirusTotal API. Allows domain/IP research, and searching for file
hashes and scan reports.

[Multi rbl](http://multirbl.valli.org/) - Multiple DNS blacklist and forward
confirmed reverse DNS lookup over more than 300 RBLs.

NormShield Services - Free API Services
for detecting possible phishing domains, blacklisted ip addresses and breached
accounts.

[PhishStats](https://phishstats.info/) - Phishing Statistics with search for
IP, domain and website title

Spyse - subdomains, whois, realted domains, DNS, hosts AS, SSL/TLS info,

[SecurityTrails](https://securitytrails.com/) - Historical and current WHOIS,
historical and current DNS records, similar domains, certificate information
and other domain and IP related API and tools.

SpamCop - IP based spam block list.

[SpamHaus](https://www.spamhaus.org/lookup/) - Block list based on
domains and IPs.

Sucuri SiteCheck - Free Website Malware
and Security Scanner.

ENJOY β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘File #Carving #Mlawares

 extracting files from inside disk and memory images.

[bulk_extractor](https://github.com/simsong/bulk_extractor) - Fast file
carving tool.

EVTXtract - Carve Windows
Event Log files from raw binary data.

[Foremost](http://foremost.sourceforge.net/) - File carving tool designed
by the US Air Force.

hachoir3 - Hachoir is a Python library
to view and edit a binary stream field by field.

[Scalpel](https://github.com/sleuthkit/scalpel) - Another data carving
tool.

SFlock - Nested archive
extraction/unpacking (used in Cuckoo Sandbox).

ENJOY β€οΈπŸ‘πŸ»
βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHEN SANDBOX BECOME A MALWARE ?
#FastTip

Nearly every malware analysis sandbox looks at the system call interface or the Windows API when monitoring the behavior of a user mode process. ...

> In other words, a sandbox may see a malware read from a script, but it can not tell how the malware actually handles the data.

@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Essential malware analysis reading material #resources
#Malware/

[Learning Malware Analysis](
https://www.packtpub.com/networking-and-servers/learning-malware-analysis) - Learning Malware Analysis: Explore the concepts, tools, and techniques to analuze and investigate Windows malware

Mastering Malware Analysis - Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercime, and IoT attacks

[Mastering Reverse Engineering](https://www.packtpub.com/networking-and-servers/mastering-reverse-engineering) - Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Practical Malware Analysis - The Hands-On
Guide to Dissecting Malicious Software.

[Practical Reverse Engineering](https://www.amzn.com/dp/1118787315/) -
Intermediate Reverse Engineering.

Real Digital Forensics - Computer
Security and Incident Response.

[Rootkits and Bootkits](https://www.amazon.com/dp/1593277164) - Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats

The Art of Memory Forensics - Detecting
Malware and Threats in Windows, Linux, and Mac Memory.

[The IDA Pro Book](https://amzn.com/dp/1593272898) - The Unofficial Guide
to the World's Most Popular Disassembler.

The Rootkit Arsenal - The Rootkit Arsenal:
Escape and Evasion in the Dark Corners of the System




ENJOY β€οΈπŸ‘πŸ»
βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ #Awesome repo Lists new :


[Android Security](https://github.com/ashishb/android-security-awesome)

AppSec

[CTFs](https://github.com/apsdehal/awesome-ctf)

Forensics

["Hacking"](https://github.com/carpedm20/awesome-hacking)

Honeypots

[Industrial Control System Security](https://github.com/hslatman/
awesome-industrial-control-system-security)

Incident-Response

[Infosec](https://github.com/onlurking/awesome-infosec)

PCAP Tools

[Pentesting](https://github.com/enaqx/awesome-pentest)

Security

[Threat Intelligence](https://github.com/hslatman/awesome-threat-
intelligence)

YARA

ENJOY β€οΈπŸ‘πŸ»
βœ…2020 GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Bin For Spotify 3 Months Premium + ATRESplayer Premium

BIN: 5183024500xxxxxx
DATE: Rnd
CVV: Rnd
IP: USA πŸ‡ΊπŸ‡Έ

βœ…Spotify
βœ…AteresPlayer

How use bin https://t.me/UnderCodeTesting/3768
Forwarded from Backup Legal Mega