Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
How to break the onlyfans paywall, is it posible
?
πŸ—£chamodhb7

The amount of effort required would probably not be worth it. Just pay the fee or go to pornhub for free bro
πŸ‘€Packathonjohn

Horny fuck
πŸ‘€TheGOATofMinecraft99

Anything is possible if you try hard enough.
πŸ‘€Doc-Brown1911

#Fun

πŸŽ–@malwr
😁1
Quick introduction on how to set up Ghidra for analysing bare metal firmwares by @attifyme

https://blog.attify.com/analyzing-bare-metal-firmware-binaries-in-ghidra/

#reverseengineering #embedded #iot #hacking #beginner
πŸ—£0xor0ne


πŸŽ–@malwr
Want to know from which source file line a specific instruction comes? With the right debug info, IDA can show you that 🌐 https://hex-rays.com/blog/igors-tip-of-the-week-130-source-line-numbers/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=Igor-Tip-130

#IgorsTipOfTheWeek #IDAtips #IDAPro
πŸ—£HexRaysSA


πŸŽ–@malwr
Here’s a tutorial on how to unpack Android APKs with the Medusa framework!

This is an alternative method of decoding using dynamic analysis rather than static analysis which I used in my previous video: Writing a Custom Android Decryptor in Java.

https://youtu.be/ffM5R2Wfl0A
πŸ—£lauriewired


πŸŽ–@malwr
I have written a brief article explaining how compilation units matching work in #Diaphora:

https://github.com/joxeankoret/diaphora/blob/master/doc/articles/compilation_units.md
πŸ—£matalaz


πŸŽ–@malwr
I just published my implementation of call stack spoofing using hardware breakpoints 😁
Works for syscalls and APIs, supports x64, x86 and WoW64.
https://www.coresecurity.com/blog/hardware-call-stack
πŸ—£s4ntiago_p


πŸŽ–@malwr
The Red Report 2023 β€” A comprehensive analysis of the most prevalent TTPs used in 2022, and how they were leveraged by threat actors. Based on an in-depth analysis of over 500,000 real-world malware samples collected from a wide range of sources.

https://drive.google.com/file/d/1Rp2QF4e5-zvdtPJApaiRQEGtscweb8SV/view
πŸ—£snkhan


πŸŽ–@malwr
πŸ‘1