π [ vxunderground, vx-underground ]
We've updated the vx-underground Malware Defense collection. We have added 60 new papers.
Have a nice day.
Check it out here: https://t.co/djuVYEkbLT
π https://www.vx-underground.org/malware_defense.html#malware_analysis
π₯ [ tweet ]
We've updated the vx-underground Malware Defense collection. We have added 60 new papers.
Have a nice day.
Check it out here: https://t.co/djuVYEkbLT
π https://www.vx-underground.org/malware_defense.html#malware_analysis
π₯ [ tweet ]
π [ vxunderground, vx-underground ]
We've updated the vx-underground Malware Analysis collection. We have added 13 new papers courtesy of @malpedia.
Check it out here: https://t.co/djuVYEkbLT
Have a nice day.
π https://www.vx-underground.org/malware_defense.html#malware_analysis
π₯ [ tweet ]
We've updated the vx-underground Malware Analysis collection. We have added 13 new papers courtesy of @malpedia.
Check it out here: https://t.co/djuVYEkbLT
Have a nice day.
π https://www.vx-underground.org/malware_defense.html#malware_analysis
π₯ [ tweet ]
π [ fr0gger_, Thomas Roccia π€ ]
I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!
Which one are you using the most? π
#python #malware #cybersecurity #infosec
https://t.co/4q7N0ydQJa
π https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0
π₯ [ tweet ]
I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!
Which one are you using the most? π
#python #malware #cybersecurity #infosec
https://t.co/4q7N0ydQJa
π https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0
π₯ [ tweet ]
π [ c3rb3ru5d3d53c, ΟΞ΅ΡΞ²Ξ΅ΡΞΌs - ΠΌΞ±βΟΞ±ΡΞ΅ ΡΞ΅sΡαΡΟΠ½Ξ΅Ρ ]
Hey guys, my #malware #analysis for absolute beginners guide just dropped!
β Completely Free
β Mistakes to Avoid
β Setting up your first VM
β Purpose Driven
β Where to get Malware Samples
β Creating a Portfolio
Recording a video soon too! π
https://t.co/zL8Sr0IzHG https://t.co/IYJV7mEatt
π https://c3rb3ru5d3d53c.github.io/docs/malware-analysis-beginner-guide/
π₯ [ tweet ][ quote ]
Hey guys, my #malware #analysis for absolute beginners guide just dropped!
β Completely Free
β Mistakes to Avoid
β Setting up your first VM
β Purpose Driven
β Where to get Malware Samples
β Creating a Portfolio
Recording a video soon too! π
https://t.co/zL8Sr0IzHG https://t.co/IYJV7mEatt
π https://c3rb3ru5d3d53c.github.io/docs/malware-analysis-beginner-guide/
π₯ [ tweet ][ quote ]
π [ embee_research, Matthew ]
In depth analysis of a 6-stage #asyncrat #malware loader using #cyberchef + #dnspyπ
Persistent .lnk -> .py script -> 2nd .py script -> .NET DLL (reflection) -> .NET DLL (injected into msbuild.exe) -> .NET dll (custom obfuscation) -> .NET .exe (asyncrat)
https://t.co/e2Y5jHOOYy
π https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader
π₯ [ tweet ]
In depth analysis of a 6-stage #asyncrat #malware loader using #cyberchef + #dnspyπ
Persistent .lnk -> .py script -> 2nd .py script -> .NET DLL (reflection) -> .NET DLL (injected into msbuild.exe) -> .NET dll (custom obfuscation) -> .NET .exe (asyncrat)
https://t.co/e2Y5jHOOYy
π https://www.huntress.com/blog/snakes-on-a-domain-an-analysis-of-a-python-malware-loader
π₯ [ tweet ]
π [ Octoberfest73, Octoberfest7 ]
Iβm pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exeβs in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1
#redteam #cybersecurity #malware
π https://github.com/Octoberfest7/Inline-Execute-PE
π₯ [ tweet ]
Iβm pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exeβs in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1
#redteam #cybersecurity #malware
π https://github.com/Octoberfest7/Inline-Execute-PE
π₯ [ tweet ]
π [ DarkCoderSc, Jean-Pierre LESUEUR ]
πΈπ½ Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: https://t.co/9Dkf19MhJL
#InfoSec #Malware #Network #Evasion #FTP
π https://github.com/DarkCoderSc/SharpFtpC2
π₯ [ tweet ]
πΈπ½ Interested in C2 over FTP(S)? Explore my new project, SharpFtpC2, which enables execution of shell commands on remote systems via FTP(S). Currently in beta and lacking encryption, but it's on the way: https://t.co/9Dkf19MhJL
#InfoSec #Malware #Network #Evasion #FTP
π https://github.com/DarkCoderSc/SharpFtpC2
π₯ [ tweet ]
π₯3
π [ Octoberfest73, Octoberfest7 ]
Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.
This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.
#redteam #Malware
π https://github.com/Octoberfest7/TeamsPhisher
π₯ [ tweet ]
Happy early 4th- TeamsPhisher is out now! Send messages + attachments to external Teams users for the purpose of phishing for access.
This short project was a fun departure from all of the BOF and Post-ex stuff I typically focus on.
#redteam #Malware
π https://github.com/Octoberfest7/TeamsPhisher
π₯ [ tweet ]
π₯3π1
π [ OtterHacker, OtterHacker ]
Hey ! I published a large part of my notes, and I hope you will find something new to learn in it. It goes from simple #OSCP notes to #Malware development (#COFFLoader, #ModuleStomping, #ReflectiveDLLInjection...).
π https://otterhacker.github.io
π₯ [ tweet ]
Hey ! I published a large part of my notes, and I hope you will find something new to learn in it. It goes from simple #OSCP notes to #Malware development (#COFFLoader, #ModuleStomping, #ReflectiveDLLInjection...).
π https://otterhacker.github.io
π₯ [ tweet ]
π10
π [ Antonio 's4tan' Parata @s4tan ]
I wrote a new post: "Exploiting a vulnerable Minifilter Driver to create a process killer" source code: #malware #byovd
π https://antonioparata.blogspot.com/2024/02/exploiting-vulnerable-minifilter-driver.html
π https://github.com/enkomio/s4killer
π₯ [ tweet ]
I wrote a new post: "Exploiting a vulnerable Minifilter Driver to create a process killer" source code: #malware #byovd
π https://antonioparata.blogspot.com/2024/02/exploiting-vulnerable-minifilter-driver.html
π https://github.com/enkomio/s4killer
π₯ [ tweet ]
π3π₯±2
π [ Elastic Security Labs @elasticseclabs ]
#ElasticSecurityLabs has discovered PUMAKIT, a new #linux #malware with advanced stealth mechanisms. The kernel rootkit is capable of privilege escalation, anti-debugging measures, and more. Get the details here:
π https://www.elastic.co/security-labs/declawing-pumakit/
π₯ [ tweet ]
#ElasticSecurityLabs has discovered PUMAKIT, a new #linux #malware with advanced stealth mechanisms. The kernel rootkit is capable of privilege escalation, anti-debugging measures, and more. Get the details here:
π https://www.elastic.co/security-labs/declawing-pumakit/
π₯ [ tweet ]
π5