SecurityOnline: EKFiddle v1.1.9 released: A framework to study Exploit Kits https://securityonline.info/ekfiddle-framework-study-exploit-kits/ #MalwareAnalysis #EKFiddle
Generating FLIRT signatures for Nim and other non-C programming languages - Adversaries are increasingly writing malware in programming languages such as Go, Rust, o... https://blog.talosintelligence.com/generating-flirt-signatures-for-nim-and-other-non-c-programming-languages/ #malwareanalysis #ida #nim
Talos: Generating FLIRT signatures for Nim and other non-C programming languages https://blog.talosintelligence.com/generating-flirt-signatures-for-nim-and-other-non-c-programming-languages/ #MalwareAnalysis #IDA #Nim
SecurityOnline: PortEx v4.0.7 releases: Java library for static malware analysis of Portable Executable files https://securityonline.info/portex-java-library-for-static-malware-analysis-of-portable-executable-files/ #Javamalwareanalysis #MalwareAnalysis
#javamalwareanalysis #malwareanalysis
SecurityOnline: saferwall v0.5 releases: Collaborative and Streamlined Threat Analysis at Scale https://securityonline.info/saferwall-an-open-source-malware-analysis-platform/ #MalwareAnalysis #saferwall
SecurityOnline: Malcolm v23.08.1 releases: powerful, easily deployable network traffic analysis tool https://securityonline.info/malcolm/ #MalwareAnalysis #Defense #Malcolm
#malwareanalysis #defense #malcolm
SecurityOnline: Malcolm v23.08 releases: powerful, easily deployable network traffic analysis tool https://securityonline.info/malcolm/ #MalwareAnalysis #Defense #Malcolm
#malwareanalysis #defense #malcolm
SecurityOnline: WhacAMole v5.8.9.1461 releases: Live memory analysis tool https://securityonline.info/whacamole-live-memory-analysis-tool/ #Livememoryanalysis #MalwareAnalysis #WhacAMole
#livememoryanalysis #malwareanalysis #whacamole
SecurityOnline: malwoverview v5.4.1 releases: perform an initial and quick triage on a directory containing malware samples https://securityonline.info/malwoverview/ #MalwareAnalysis #malwoverview
#malwareanalysis #malwoverview
SecurityOnline: MISP v2.4.174 released – Malware Information Sharing Platform & Threat Sharing https://securityonline.info/misp-malware-information-sharing-platform-threat-sharing/ #MalwareAnalysis #Forensics #Defense #MISP
#malwareanalysis #forensics #defense #misp
SecurityOnline: maltrail v0.60 releases: Malicious traffic detection system https://securityonline.info/maltrail-malicious-traffic-detection-system/ #MalwareAnalysis #Forensics #maltrail
#malwareanalysis #forensics #maltrail
SecurityOnline: Quark Engine v23.7.1 releases: automating analysis of suspicious Android application https://securityonline.info/quark-engine/ #MalwareAnalysis #quark-engine
SecurityOnline: Malcolm v23.07.1 releases: powerful, easily deployable network traffic analysis tool https://securityonline.info/malcolm/ #MalwareAnalysis #Defense #Malcolm
#malwareanalysis #defense #malcolm
SecurityOnline: python-iocextract v1.16 releases: Advanced Indicator of Compromise (IOC) extractor https://securityonline.info/iocextract/ #MalwareAnalysis #iocextract
SecurityOnline: pwndbg 2023.07.17 releases: Exploit Development and Reverse Engineering with GDB https://securityonline.info/pwndbg-exploit-development-reverse-engineering-gdb/ #ReverseEngineering #reverseengineering #capture-the-flag #MalwareAnalysis #binary-ninja #disassembler #debugging #gdbinit #ida-pro #malware #pwnable #pwndbg #Python #peda #ctf #GDB #GEF
#reverseengineering #capture #malwareanalysis #binary #disassembler #debugging #gdbinit #ida #malware #pwnable #pwndbg #python #peda #ctf #gdb #gef
SecurityOnline: mitaka v1.3.1 releases: OSINT friendly IOC (Indicator of Compromise) search tool https://securityonline.info/mitaka/ #WebInformationGathering #MalwareAnalysis #Forensics #mitaka
#webinformationgathering #malwareanalysis #forensics #mitaka
Interesting #ISC diary article by #XavierMertens about how to deploy #Loki #IOC scanner quickly in a #docker container:
#InfoSec #ThreatHunting #MalwareAnalysis
https://isc.sans.edu/diary/Quick%20IOC%20Scan%20With%20Docker/29788
#isc #xaviermertens #loki #ioc #docker #infosec #threathunting #malwareanalysis
«A LNK Between Browsers: Hunting Methodologies and Extension Abusing Actors» | Mandiant
#Malware #MalwareAnalysis #MalwareTechniques #Cybersecurity
https://www.mandiant.com/resources/blog/lnk-between-browsers
#malware #malwareanalysis #malwaretechniques #cybersecurity
Does anyone know what the crowstrike AI extracted string means from an analysis ?
hxxp://this.props.pagesize/2)),e.currentdatapageendindex=math.min(e.currentdatapagestartindex+this.props.pagesize,this.props.rows.length-1),r=!0
#AI #Crowdstrike #CyberSecurity #MalwareAnalysis #Infosec #informationSecurity #HybridAnalysis #Phishing
#AI #crowdstrike #cybersecurity #malwareanalysis #infosec #informationsecurity #hybridanalysis #phishing
Cyber security threats can come from anywhere, including phishing emails, malware, and social engineering.
Don't leave your online security to chance, take proactive steps to keep your data safe and secure.
Discover our tailored Cyber Security Solutions here.
tecvity.co
hello@tecvity.co
#tecvity #cybersecurity #cybersecurityservices #cyberthreatintelligence #cybersecurityexpert #malwareanalysis #digitalprotection
#tecvity #cybersecurity #cybersecurityservices #cyberthreatintelligence #cybersecurityexpert #malwareanalysis #digitalprotection