Uncovering a Fake Recruiter Scam with OSINT techniques
๐ฃsmicallef
honestly, can't we all tell this is sus just looking at it? I mean good job on the digging but trust your instincts, luke, this just smells wrong
๐คBadSausageFactory
Excellent! Thanks.
๐คRolandTDeschain
So.. he like.. identified an incredibly obvious phishing email?
๐คfuktpotato
๐@malwr
๐ฃsmicallef
honestly, can't we all tell this is sus just looking at it? I mean good job on the digging but trust your instincts, luke, this just smells wrong
๐คBadSausageFactory
Excellent! Thanks.
๐คRolandTDeschain
So.. he like.. identified an incredibly obvious phishing email?
๐คfuktpotato
๐@malwr
How classical attacks reverse engineering apply to Flutter apps, a game cheating case study
๐ฃFloni
What's a Flutter app?
๐คAllenKll
In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.
๐คFloni
๐@malwr
๐ฃFloni
What's a Flutter app?
๐คAllenKll
In the last two blog posts in our Flutter reverse engineering series that we shared here, we had a look at the state of reverse engineering flutter apps and the obstacles in decompiled Dart code. In this final blog post we investigated how classical reverse engineering attacks, such as code patching and hooking, can be used on Flutter apps by trying them out to cheat in a game.
๐คFloni
๐@malwr
Guardsquare
How classical attacks apply to Flutter apps | Guardsquare
Are the classical attacks that we see on mobile applications applicable to Flutter apps? Learn more about flutter app security and Frida Flutter.
Decompiling x86 Deep Neural Network Executables
๐ฃmttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
๐คWarrantyVoider
๐@malwr
๐ฃmttd
has anyone some infos about "DNN Executables", ive never heard of this and all google results point to the same paper...
EDIT: thx
๐คWarrantyVoider
๐@malwr
GitHub
GitHub - monkbai/DNN-decompiler: BTD - Bin To DNN: A DNN Executables Decompiler
BTD - Bin To DNN: A DNN Executables Decompiler. Contribute to monkbai/DNN-decompiler development by creating an account on GitHub.
IDA Free 8.1 released:
https://hex-rays.com/ida-free/
Windows: https://out7.hex-rays.com/files/idafree81_windows.exe
Linux: https://out7.hex-rays.com/files/idafree81_linux.run
Mac: https://out7.hex-rays.com/files/idafree81_mac.app.zip
Mac Arm: https://out7.hex-rays.com/files/arm_idafree81_mac.app.zip
๐@malwr
https://hex-rays.com/ida-free/
Windows: https://out7.hex-rays.com/files/idafree81_windows.exe
Linux: https://out7.hex-rays.com/files/idafree81_linux.run
Mac: https://out7.hex-rays.com/files/idafree81_mac.app.zip
Mac Arm: https://out7.hex-rays.com/files/arm_idafree81_mac.app.zip
๐@malwr
๐3
Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure
๐ฃdigicat
๐@malwr
๐ฃdigicat
๐@malwr
Unit 42
Banking Trojan Techniques: How Financially Motivated Malware Became Infrastructure
Understanding banking Trojan techniques can help detect other activities of financially motivated threat groups.
๐1