API Monitor32 - Detecting Windows API hooking and modification for analysis purposes
π£ytk2128
π@malwr
π£ytk2128
π@malwr
GitHub
GitHub - ytk2128/api-monitor32: A simple tool for detecting memory modifications to Windows API.
A simple tool for detecting memory modifications to Windows API. - ytk2128/api-monitor32
π1
Freeze - a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods
π£CyberMasterV
π@malwr
π£CyberMasterV
π@malwr
GitHub
GitHub - optiv/Freeze: Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternativeβ¦
Freeze is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls, and alternative execution methods - optiv/Freeze
Uncovering a Fake Recruiter Scam with OSINT techniques
π£smicallef
honestly, can't we all tell this is sus just looking at it? I mean good job on the digging but trust your instincts, luke, this just smells wrong
π€BadSausageFactory
Excellent! Thanks.
π€RolandTDeschain
So.. he like.. identified an incredibly obvious phishing email?
π€fuktpotato
π@malwr
π£smicallef
honestly, can't we all tell this is sus just looking at it? I mean good job on the digging but trust your instincts, luke, this just smells wrong
π€BadSausageFactory
Excellent! Thanks.
π€RolandTDeschain
So.. he like.. identified an incredibly obvious phishing email?
π€fuktpotato
π@malwr
How classical attacks reverse engineering apply to Flutter apps, a game cheating case study
π£Floni
What's a Flutter app?
π€AllenKll
In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.
π€Floni
π@malwr
π£Floni
What's a Flutter app?
π€AllenKll
In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.
π€Floni
π@malwr
Guardsquare
How classical attacks apply to Flutter apps | Guardsquare
Are the classical attacks that we see on mobile applications applicable to Flutter apps? Learn more about flutter app security and Frida Flutter.
Decompiling x86 Deep Neural Network Executables
π£mttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
π€WarrantyVoider
π@malwr
π£mttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
π€WarrantyVoider
π@malwr
GitHub
GitHub - monkbai/DNN-decompiler: BTD - Bin To DNN: A DNN Executables Decompiler
BTD - Bin To DNN: A DNN Executables Decompiler. Contribute to monkbai/DNN-decompiler development by creating an account on GitHub.