Malware News
12.7K subscribers
1.63K photos
7 videos
130 files
7.78K links
The latest NEWS about malwares, DFIR, hacking, security issues, thoughts and ...

Partner channel: @cveNotify

For ads: https://telega.io/c/malwr
Download Telegram
(1/2)
Here's a list of a few tools that can be useful for firmware unpacking, repacking and
analysis

binwalk: https://github.com/ReFirmLabs/binwalk
EMBA: https://github.com/e-m-b-a/emba
unblob: https://github.com/onekey-sec/unblob

#iot #embedded #reverseengineering #infosec ##cybersecurity
πŸ—£0xor0ne


πŸŽ–@malwr
Researchers from Palo Alto Networks' Unit 42 Team recently discovered a new sample of Golang-based malware. GoBruteforcer targets web servers, specifically those running phpMyAdmin, MySQL, FTP and Postgres services. https://unit42.paloaltonetworks.com/gobruteforcer-golang-botnet/
πŸ—£virusbtn


πŸŽ–@malwr
Google Cloud Platform Exfiltration : A Threat Hunting Guide : https://www.mitiga.io/blog/google-cloud-platform-exfiltration-a-threat-hunting-guide
πŸ—£binitamshah


πŸŽ–@malwr
Blink : tiniest x86-64-linux emulator : https://github.com/jart/blink credits @JustineTunney

cosmopolitan : build-once run-anywhere c library : https://github.com/jart/cosmopolitan
πŸ—£binitamshah


πŸŽ–@malwr
Win32 Offensive Cheatsheet

Win32 and Kernel abusing techniques for pentesters & red-teamers.

https://github.com/matthieu-hackwitharts/Win32_Offensive_Cheatsheet

#pentesting #redteam https://t.me/hackgit/7899
πŸ—£hack_git


πŸŽ–@malwr
πŸ”₯2
Released my sRDI (Shellcode Reflective DLL Injection) implementation.

https://github.com/daem0nc0re/TangledWinExec/tree/main/sRDI
πŸ—£daem0nc0re


πŸŽ–@malwr
πŸ‘2
Did you know that IDA Free has been updated to 8.2 and gained some new features πŸ‘‡ Give it a try today 🌐 https://hex-rays.com/ida-free/?utm_source=Social-Media-Post&utm_medium=Twitter&utm_campaign=ida-free-updated-8-2

#IDAFree #HexRays #ReverseEngineering #MalwareAnalysis
πŸ—£HexRaysSA


πŸŽ–@malwr
πŸ‘1
Bypass Windows Defender with FilelessPELoader
Offensive security professional 'TheD1rkMtr' released a C++ tool, titled 'FilelessPELoader' on his Github repository earlier this year in 2023.

The publicly available tool was able to bypass the latest Windows Defender and successfully load and execute Mimikatz on a Windows system. The proof of concept along with the source code of the tool can be found in the author's Github repository over here.

As publicly available tools that claim to bypass Windows Defender are usually rapidly signatured and prevented by the AV/EDR vendors, an attempt was conducted to verify if the C++ 'FilelessPELoader' tool is still functional, and if it is still possible to bypass the latest Windows Defender on an updated Windows system.

This video posted by the Gemini Security channel on Youtube provides a step-by-step walkthrough on how to compile the C++ tool FilelessPELoader and the usage of it, demonstrating that it is STILL possible to bypass Windows Defender, loading and executing the Mimikatz.exe binary. The video also provides a demonstration on using the FilelessPELoader tool to load and execute a Meterpreter reverse shell, successfully establishing a functional reverse shell back to a Kali OS.

If you're up against Windows Defender and require a bypass, this might be the solution for you.
πŸ—£cybermepls


πŸŽ–@malwr