Fortinet researchers analyse ScrubCrypt and other malware delivered by the 8220 Gang threat actor on an exploitable Oracle Weblogic Server. https://www.fortinet.com/blog/threat-research/old-cyber-gang-uses-new-crypter-scrubcrypt
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Businesses in IT, healthcare, and manufacturing industries suffered the most ransomware attacks in the fourth quarter of 2022. https://research.trendmicro.com/3ZdZTU2
π£TrendMicroRSRCH
π@malwr
π£TrendMicroRSRCH
π@malwr
We've updated the vx-underground malware sample collection. We've added 54,258 samples.
Special thanks to petikvx
Check it out here: https://www.vx-underground.org/malware.html
π£vxunderground
π@malwr
Special thanks to petikvx
Check it out here: https://www.vx-underground.org/malware.html
π£vxunderground
π@malwr
Malware News pinned Β«πππPlease forward posts to the other groups πππΒ»
Writing a Debugger From Scratch - DbgRs Part 2 - Register State and Stepping https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2/ #Pentesting #Debugging #CyberSecurity #Infosec
π£ptracesecurity
π@malwr
π£ptracesecurity
π@malwr
π₯1
AhnLab ASEC researchers look into attacks against poorly managed MS-SQL servers. The threat actors used not only Cobalt Strike but also the Netcat tool in their attacks, along with other malware for privilege escalation, information theft & proxy tools. https://asec.ahnlab.com/en/49249/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
#Fortinet released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. More: http://cisa.gov/news-events/alerts/2023/03/09/fortinet-releases-march-2023-vulnerability-advisories #Cybersecurity #InfoSec #VulnerabilityManagement
π£CISACyber
π@malwr
π£CISACyber
π@malwr
vmlinux-to-elf is a useful tool for converting vmlinux/vmlinuz/bzImage/zImage kernel images to and ELF file that can be analyzed with IDA and Ghidra.
https://github.com/marin-m/vmlinux-to-elf
#Linux #kernel #reverseengineering #tool
π£0xor0ne
π@malwr
https://github.com/marin-m/vmlinux-to-elf
#Linux #kernel #reverseengineering #tool
π£0xor0ne
π@malwr
π1
Malware Development for Dummies : https://github.com/chvancooten/maldev-for-dummies credits @chvancooten
π£binitamshah
π@malwr
π£binitamshah
π@malwr
GitHub
GitHub - chvancooten/maldev-for-dummies: A workshop about Malware Development
A workshop about Malware Development. Contribute to chvancooten/maldev-for-dummies development by creating an account on GitHub.
Box64 - Linux Userspace x86_64 Emulator with a twist, targeted at ARM64 Linux devices : https://github.com/ptitSeb/box64
Box86 - Linux Userspace x86 Emulator with a twist, targeted at ARM Linux devices : https://github.com/ptitSeb/box86
π£binitamshah
π@malwr
Box86 - Linux Userspace x86 Emulator with a twist, targeted at ARM Linux devices : https://github.com/ptitSeb/box86
π£binitamshah
π@malwr
GitHub
GitHub - ptitSeb/box64: Box64 - Linux Userspace x86_64 Emulator with a twist, targeted at ARM64, RV64 and LoongArch Linux devices
Box64 - Linux Userspace x86_64 Emulator with a twist, targeted at ARM64, RV64 and LoongArch Linux devices - ptitSeb/box64
A dive into the PE file format - PE file structure (Part 6) : PE Base Relocations : https://0xrick.github.io/win-internals/pe7/
5 : https://0xrick.github.io/win-internals/pe6/
4 : https://0xrick.github.io/win-internals/pe5/
3 : https://0xrick.github.io/win-internals/pe4/
2 : https://0xrick.github.io/win-internals/pe3/
Writing a PE Parser : https://0xrick.github.io/win-internals/pe8/
π£binitamshah
π@malwr
5 : https://0xrick.github.io/win-internals/pe6/
4 : https://0xrick.github.io/win-internals/pe5/
3 : https://0xrick.github.io/win-internals/pe4/
2 : https://0xrick.github.io/win-internals/pe3/
Writing a PE Parser : https://0xrick.github.io/win-internals/pe8/
π£binitamshah
π@malwr
0xRick's Blog
A dive into the PE file format - PE file structure - Part 6: PE Base Relocations
A dive into the PE file format - PE file structure - Part 6: PE Base Relocations Introduction In this post weβre going to talk about PE base relocations. Weβre going to discuss what relocations are, then weβll take a look at the relocation table. Relocationsβ¦
β€1
Cyber Security Resources
Thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
https://github.com/The-Art-of-Hacking/h4cker
#i⦠https://t.me/hackgit/7855
π£hack_git
π@malwr
Thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
https://github.com/The-Art-of-Hacking/h4cker
#i⦠https://t.me/hackgit/7855
π£hack_git
π@malwr
Attacking .NET services : https://www.securifera.com/blog/2023/03/06/attacking-net-web-services/ credits @Securifera
π£binitamshah
π@malwr
π£binitamshah
π@malwr
Securifera
Attacking .NET Web Services
This article is in no way affiliated, sponsored, or endorsed with/by Siemens Healthineers or Microsoft Corporation. All graphics are being displayed under fair use for the purposes of this article.
Last year I spent some time looking for vulnerabilitiesβ¦
Last year I spent some time looking for vulnerabilitiesβ¦
I've made my recent Ghidra improments into one repository:
Ghidra's IDA like experience by @NyaMisty
https://github.com/NyaMisty/GhidraIDA
π£MiscMisty
π@malwr
Ghidra's IDA like experience by @NyaMisty
https://github.com/NyaMisty/GhidraIDA
π£MiscMisty
π@malwr
GitHub
GitHub - NyaMisty/GhidraIDA: Ghidra's IDA like experience by @NyaMisty
Ghidra's IDA like experience by @NyaMisty. Contribute to NyaMisty/GhidraIDA development by creating an account on GitHub.
Exploring iOS Applications with Frida and Objection: Basic Commands for Pentesting
https://link.medium.com/PNqr6rWs6xb
#Security #Pentesting #SecurityEveryday #BugBounty #Pentest #AppSec
π£busk3r
π@malwr
https://link.medium.com/PNqr6rWs6xb
#Security #Pentesting #SecurityEveryday #BugBounty #Pentest #AppSec
π£busk3r
π@malwr
Medium
Exploring iOS Applications with Frida and Objection: Basic Commands for Pentesting
Mobile application Pentesting is an essential part of securing any organizationβs mobile assets. To perform thorough penetration testing, aβ¦