Nice beginners series by @IntezerLabs on malware reverse engineering
Part 1: https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Part 2: https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/
#malware
π£0xor0ne
π@malwr
Part 1: https://www.intezer.com/blog/malware-analysis/malware-reverse-engineering-beginners/
Part 2: https://www.intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/
#malware
π£0xor0ne
π@malwr
π₯1
Malware Reverse Engineering for Beginners - Part 2 https://intezer.com/blog/incident-response/malware-reverse-engineering-for-beginners-part-2/ #Pentesting #Malware #ReverseEngineering #CyberSecurity #Infosec
π£ptracesecurity
π@malwr
π£ptracesecurity
π@malwr
DFIR Framework for OT
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8428.pdf
Join us to get access to the best cyber security research and innovation reports and other essential tools for cyber professionals:
https://cyberstartupobservatory.com/cyber-security-newsletter/
#CyberSecurity #InfoSec #InformationSecurity
π£MaiteOrtegaCSO
π@malwr
Source: NIST
Download Link:
https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8428.pdf
Join us to get access to the best cyber security research and innovation reports and other essential tools for cyber professionals:
https://cyberstartupobservatory.com/cyber-security-newsletter/
#CyberSecurity #InfoSec #InformationSecurity
π£MaiteOrtegaCSO
π@malwr
Investigate Attack Patterns using SIEM, Sysmon Utility and MITRE ATT&CK | by Kelvin Ling | Medium https://medium.com/@kelvin_ling/investigate-attack-patterns-using-siem-sysmon-utility-and-mitre-att-ck-5a569b2a9d4b
π£NeobeePaul
π@malwr
π£NeobeePaul
π@malwr
Medium
Investigate Attack Patterns using SIEM, Sysmon Utility and MITRE ATT&CK
In the βNew Hire Old Artifactsβ TryHackMe room, we can investigate a cyber incident using SIEM softwareβββSplunk. The logs provided toβ¦
Here are the slides from @cffsmith and myself about some of our recent work in the JavaScript engine fuzzing space, presented @offensive_con last week: https://saelo.github.io/presentations/offensivecon_23_advancements_in_javascript_engine_fuzzing.pdf
π£5aelo
π@malwr
π£5aelo
π@malwr
Presentation Slides
Collections of Dhiyaneshwaran public presentation slides.
https://github.com/DhiyaneshGeek/My-Presentation-Slides
#cybersecurity #infosec #pentesting
https://t.me/hackgit/8855
π£hack_git
π@malwr
Collections of Dhiyaneshwaran public presentation slides.
https://github.com/DhiyaneshGeek/My-Presentation-Slides
#cybersecurity #infosec #pentesting
https://t.me/hackgit/8855
π£hack_git
π@malwr
semgrep: Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.
βοΈ 8202
Author: @semgrep
#golang
https://github.com/returntocorp/semgrep
π£GolangRepos
π@malwr
βοΈ 8202
Author: @semgrep
#golang
https://github.com/returntocorp/semgrep
π£GolangRepos
π@malwr
GitHub
GitHub - semgrep/semgrep: Lightweight static analysis for many languages. Find bug variants with patterns that look like sourceβ¦
Lightweight static analysis for many languages. Find bug variants with patterns that look like source code. - semgrep/semgrep
gato: GitHub Self-Hosted Runner Enumeration and Attack Tool - an enumeration and attack tool that allows both blue teamers and offensive security practitioners to evaluate the blast radius of a compromised personal access token within a GitHub organization.
π£digicat
π@malwr
π£digicat
π@malwr
GitHub
GitHub - praetorian-inc/gato: GitHub Actions Pipeline Enumeration and Attack Tool
GitHub Actions Pipeline Enumeration and Attack Tool - praetorian-inc/gato
ESET researchers reveal details of a prevalent cryptor, operating as a cryptor-as-a-service, used by tens of malware families. AceCryptor is heavily obfuscated and throughout the years has incorporated many techniques to avoid detection. https://www.welivesecurity.com/2023/05/25/shedding-light-acecryptor-operation/
π£virusbtn
π@malwr
π£virusbtn
π@malwr
JPCERT/CC's Yuma Masubuchi provides details of an attack targeting Linux routers with the GobRAT malware. The attacker initially targets a router with WEBUI open to the public, executes scripts possibly by using vulnerabilities, & finally executes GobRAT. https://blogs.jpcert.or.jp/en/2023/05/gobrat.html
π£virusbtn
π@malwr
π£virusbtn
π@malwr
Trend Micro's Sarah Pearl Camiling & Paul John Bardon write about a new Go-based information-stealing malware named Bandit Stealer, which targets numerous browsers and cryptocurrency wallets while evading detection. https://www.trendmicro.com/en_us/research/23/e/new-info-stealer-bandit-stealer-targets-browsers-wallets.html
π£virusbtn
π@malwr
π£virusbtn
π@malwr
π1
WinDiff - Browse and compare exports, debug symbols and debug types of PEs between Windows versions.
WinDiff is a streamlined revamp of ntdiff, wired directly to Winbindex to fetch Windows updates and PEs automatically.
App: https://windiff.vercel.app
Repo: https://github.com/ergrelet/windiff
π£ergrelet
π@malwr
WinDiff is a streamlined revamp of ntdiff, wired directly to Winbindex to fetch Windows updates and PEs automatically.
App: https://windiff.vercel.app
Repo: https://github.com/ergrelet/windiff
π£ergrelet
π@malwr
Find out the IP address through a call to Telegram⦠https://medium.com/@ibederov_en/find-out-the-ip-address-through-a-call-to-telegram-a899441b1bac #Pentesting #CyberSecurity #Infosec
π£ptracesecurity
π@malwr
π£ptracesecurity
π@malwr
π1
Let's get started with function flowcharts with IDAPython (part 1). https://youtu.be/omzxE6OoBVk
π£allthingsida
π@malwr
π£allthingsida
π@malwr
YouTube
IDAPython: Introduction to function flowcharts
This is a two parts series. In the first video, we will introduce the flowcharts concept and how to generate function and program flowcharts.
Websites to Scan Files for Viruses
1. http://Avira.com
2. http://VirusTotal.com
3. http://opentip.kaspersky.com
4. http://FortiGuard.com
5. http://Virusscan.jotti.org
π£SecurityTrybe
π@malwr
1. http://Avira.com
2. http://VirusTotal.com
3. http://opentip.kaspersky.com
4. http://FortiGuard.com
5. http://Virusscan.jotti.org
π£SecurityTrybe
π@malwr
Avira
Download Security Software for Windows, Mac, Android & iOS | Avira Antivirus
Discover a range of award-winning security, privacy & performance tools for all devices β’ Antivirus β’ VPN β’ System Speedup β’ Mobile & more. Download now
Learning Resources with Labs For Offensive Security Players. https://github.com/Zeyad-Azima/Offensive-Resources
π£Dinosn
π@malwr
π£Dinosn
π@malwr
GitHub
GitHub - Zeyad-Azima/Offensive-Resources: A Huge Learning Resources with Labs For Offensive Security Players
A Huge Learning Resources with Labs For Offensive Security Players - Zeyad-Azima/Offensive-Resources
A Video Demonstration on Cracking a GSM Capture File https://www.rtl-sdr.com/a-video-demonstration-on-cracking-a-gsm-capture-file/
π£rtlsdrblog
π@malwr
π£rtlsdrblog
π@malwr
β€2
Check Point researchers analyse the TinyNote backdoor associated with the Camaro Dragon cluster of activity. This Go-based backdoor is distributed with names related to foreign affairs matters, and likely targets Southeast and East Asian embassies. https://research.checkpoint.com/2023/malware-spotlight-camaro-dragons-tinynote-backdoor/
π£virusbtn
π@malwr
π£virusbtn
π@malwr