Реверс flutter malicious apk
https://www.fortinet.com/blog/threat-research/fortinet-reverses-flutter-based-android-malware-fluhorse?utm_source=social&utm_medium=twitter-org&utm_campaign=sprinklr
https://www.fortinet.com/blog/threat-research/fortinet-reverses-flutter-based-android-malware-fluhorse?utm_source=social&utm_medium=twitter-org&utm_campaign=sprinklr
Fortinet Blog
Fortinet Reverses Flutter-based Android Malware “Fluhorse”
Gain insights into the Fluhorse malware campaign as we've managed to fully reverse engineer the malicious Flutter applications. Learn more.…
Lightweight Python-Based Malware Analysis Pipeline
https://youtu.be/ZOQHtNP27mQ
https://github.com/threatcat-ch/malware-analysis-pipeline
https://youtu.be/ZOQHtNP27mQ
https://github.com/threatcat-ch/malware-analysis-pipeline
Forming Faster Firmware Fuzzers
https://download.vusec.net/papers/safirefuzz_sec23.pdf
https://github.com/pr0me/SAFIREFUZZ
https://download.vusec.net/papers/safirefuzz_sec23.pdf
https://github.com/pr0me/SAFIREFUZZ
Beyond the DevTools: Profiling WebApps at the Assembly Level
https://leaningtech.com/beyond-devtools-profiling-webapps-at-the-assembly-level/
https://leaningtech.com/beyond-devtools-profiling-webapps-at-the-assembly-level/
Designing a Malware Loader detector with Guard Violation Exceptions
https://reversing.codes/posts/Detecting-injected-code-with-page-guards/
https://reversing.codes/posts/Detecting-injected-code-with-page-guards/
Reversing codes
Designing a Malware Loader detector with Guard Violation Exceptions
Recently, I made the decision to finally publish my tool focused on unpacking, called Shinigami. The idea for Shinigami came to me two years ago, but I never actually implemented it until now. Initially, it was designed to dump implants injected via process…
The art of fuzzing: Windows Binaries
https://bushido-sec.com/index.php/2023/06/25/the-art-of-fuzzing-windows-binaries/
https://bushido-sec.com/index.php/2023/06/25/the-art-of-fuzzing-windows-binaries/
Bushido Security
The art of fuzzing: Windows Binaries - Bushido Security
This article delves into the concept of grey-box fuzzing, focusing on testing closed-source Windows binaries. Grey-box fuzzing allows vulnerability researchers to discover undiscovered vulnerabilities by fuzzing targets without having access to their source…
The Threat Actor Profile Guide for CTI Analysts
https://github.com/curated-intel/Threat-Actor-Profile-Guide
https://github.com/curated-intel/Threat-Actor-Profile-Guide
GitHub
GitHub - curated-intel/Threat-Actor-Profile-Guide: The Threat Actor Profile Guide for CTI Analysts
The Threat Actor Profile Guide for CTI Analysts. Contribute to curated-intel/Threat-Actor-Profile-Guide development by creating an account on GitHub.