Malware News pinned ยซ๐๐๐Please forward posts to the other groups ๐๐๐ยป
Writing a Debugger From Scratch - DbgRs Part 2 - Register State and Stepping https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2/ #Pentesting #Debugging #CyberSecurity #Infosec
๐ฃptracesecurity
๐@malwr
๐ฃptracesecurity
๐@malwr
๐ฅ1
AhnLab ASEC researchers look into attacks against poorly managed MS-SQL servers. The threat actors used not only Cobalt Strike but also the Netcat tool in their attacks, along with other malware for privilege escalation, information theft & proxy tools. https://asec.ahnlab.com/en/49249/
๐ฃvirusbtn
๐@malwr
๐ฃvirusbtn
๐@malwr
#Fortinet released security updates to address vulnerabilities affecting multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system. More: http://cisa.gov/news-events/alerts/2023/03/09/fortinet-releases-march-2023-vulnerability-advisories #Cybersecurity #InfoSec #VulnerabilityManagement
๐ฃCISACyber
๐@malwr
๐ฃCISACyber
๐@malwr
vmlinux-to-elf is a useful tool for converting vmlinux/vmlinuz/bzImage/zImage kernel images to and ELF file that can be analyzed with IDA and Ghidra.
https://github.com/marin-m/vmlinux-to-elf
#Linux #kernel #reverseengineering #tool
๐ฃ0xor0ne
๐@malwr
https://github.com/marin-m/vmlinux-to-elf
#Linux #kernel #reverseengineering #tool
๐ฃ0xor0ne
๐@malwr
๐1
Malware Development for Dummies : https://github.com/chvancooten/maldev-for-dummies credits @chvancooten
๐ฃbinitamshah
๐@malwr
๐ฃbinitamshah
๐@malwr
GitHub
GitHub - chvancooten/maldev-for-dummies: A workshop about Malware Development
A workshop about Malware Development. Contribute to chvancooten/maldev-for-dummies development by creating an account on GitHub.
Box64 - Linux Userspace x86_64 Emulator with a twist, targeted at ARM64 Linux devices : https://github.com/ptitSeb/box64
Box86 - Linux Userspace x86 Emulator with a twist, targeted at ARM Linux devices : https://github.com/ptitSeb/box86
๐ฃbinitamshah
๐@malwr
Box86 - Linux Userspace x86 Emulator with a twist, targeted at ARM Linux devices : https://github.com/ptitSeb/box86
๐ฃbinitamshah
๐@malwr
GitHub
GitHub - ptitSeb/box64: Box64 - Linux Userspace x86_64 Emulator with a twist, targeted at ARM64, RV64 and LoongArch Linux devices
Box64 - Linux Userspace x86_64 Emulator with a twist, targeted at ARM64, RV64 and LoongArch Linux devices - ptitSeb/box64
A dive into the PE file format - PE file structure (Part 6) : PE Base Relocations : https://0xrick.github.io/win-internals/pe7/
5 : https://0xrick.github.io/win-internals/pe6/
4 : https://0xrick.github.io/win-internals/pe5/
3 : https://0xrick.github.io/win-internals/pe4/
2 : https://0xrick.github.io/win-internals/pe3/
Writing a PE Parser : https://0xrick.github.io/win-internals/pe8/
๐ฃbinitamshah
๐@malwr
5 : https://0xrick.github.io/win-internals/pe6/
4 : https://0xrick.github.io/win-internals/pe5/
3 : https://0xrick.github.io/win-internals/pe4/
2 : https://0xrick.github.io/win-internals/pe3/
Writing a PE Parser : https://0xrick.github.io/win-internals/pe8/
๐ฃbinitamshah
๐@malwr
0xRick's Blog
A dive into the PE file format - PE file structure - Part 6: PE Base Relocations
A dive into the PE file format - PE file structure - Part 6: PE Base Relocations Introduction In this post weโre going to talk about PE base relocations. Weโre going to discuss what relocations are, then weโll take a look at the relocation table. Relocationsโฆ
โค1
Cyber Security Resources
Thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
https://github.com/The-Art-of-Hacking/h4cker
#iโฆ https://t.me/hackgit/7855
๐ฃhack_git
๐@malwr
Thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
https://github.com/The-Art-of-Hacking/h4cker
#iโฆ https://t.me/hackgit/7855
๐ฃhack_git
๐@malwr
Attacking .NET services : https://www.securifera.com/blog/2023/03/06/attacking-net-web-services/ credits @Securifera
๐ฃbinitamshah
๐@malwr
๐ฃbinitamshah
๐@malwr
Securifera
Attacking .NET Web Services
This article is in no way affiliated, sponsored, or endorsed with/by Siemens Healthineers or Microsoft Corporation. All graphics are being displayed under fair use for the purposes of this article.
Last year I spent some time looking for vulnerabilitiesโฆ
Last year I spent some time looking for vulnerabilitiesโฆ
I've made my recent Ghidra improments into one repository:
Ghidra's IDA like experience by @NyaMisty
https://github.com/NyaMisty/GhidraIDA
๐ฃMiscMisty
๐@malwr
Ghidra's IDA like experience by @NyaMisty
https://github.com/NyaMisty/GhidraIDA
๐ฃMiscMisty
๐@malwr
GitHub
GitHub - NyaMisty/GhidraIDA: Ghidra's IDA like experience by @NyaMisty
Ghidra's IDA like experience by @NyaMisty. Contribute to NyaMisty/GhidraIDA development by creating an account on GitHub.
Exploring iOS Applications with Frida and Objection: Basic Commands for Pentesting
https://link.medium.com/PNqr6rWs6xb
#Security #Pentesting #SecurityEveryday #BugBounty #Pentest #AppSec
๐ฃbusk3r
๐@malwr
https://link.medium.com/PNqr6rWs6xb
#Security #Pentesting #SecurityEveryday #BugBounty #Pentest #AppSec
๐ฃbusk3r
๐@malwr
Medium
Exploring iOS Applications with Frida and Objection: Basic Commands for Pentesting
Mobile application Pentesting is an essential part of securing any organizationโs mobile assets. To perform thorough penetration testing, aโฆ
(1/2)
Here's a list of a few tools that can be useful for firmware unpacking, repacking and
analysis
binwalk: https://github.com/ReFirmLabs/binwalk
EMBA: https://github.com/e-m-b-a/emba
unblob: https://github.com/onekey-sec/unblob
#iot #embedded #reverseengineering #infosec ##cybersecurity
๐ฃ0xor0ne
๐@malwr
Here's a list of a few tools that can be useful for firmware unpacking, repacking and
analysis
binwalk: https://github.com/ReFirmLabs/binwalk
EMBA: https://github.com/e-m-b-a/emba
unblob: https://github.com/onekey-sec/unblob
#iot #embedded #reverseengineering #infosec ##cybersecurity
๐ฃ0xor0ne
๐@malwr
Researchers from Palo Alto Networks' Unit 42 Team recently discovered a new sample of Golang-based malware. GoBruteforcer targets web servers, specifically those running phpMyAdmin, MySQL, FTP and Postgres services. https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
๐ฃvirusbtn
๐@malwr
๐ฃvirusbtn
๐@malwr