Bookmarks
Tag cloud
Picture wall
Daily
RSS Feed
  • RSS Feed
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filters

Links per page

  • 20 links
  • 50 links
  • 100 links

Filters

Untagged links
8 results tagged malware  ✕   ✕
Karneades/awesome-malware-persistence https://github.com/Karneades/awesome-malware-persistence
Tue 15 Feb 2022 04:18:15 PM PST archive.org

Malware persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

This is an extract with only links to the tools and resources taken from the main article about malware persistence.

awesome infosec malware techniques detection removal
The DFIR Report https://thedfirreport.com
Mon 03 Jan 2022 11:34:39 AM PST archive.org

A blog that documents recent and ongoing system intrusions, with a focus on ransomware attacks.

RSS: https://thedfirreport.com/feed/

threats infosec malware intrusion news attacks glitch
KasperskyLab/TinyCheck https://github.com/KasperskyLab/TinyCheck
Thu 03 Dec 2020 05:06:10 PM PST archive.org

TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect or malicious communication is outgoing from a smartphone, by using heuristics or specific Indicators of Compromise (IoCs). In order to make it working, you need a computer with a Debian-like operating system and two Wi-Fi interfaces. The best choice is to use a Raspberry Pi (2+) a Wi-Fi dongle and a small touch screen. This tiny configuration (for less than $50) allows you to tap any Wi-Fi device, anywhere.

infosec wifi mitm monitoring raspi malware surveillance mobile
Penetration Testing | The Metasploit Project http://www.metasploit.com/
Tue 20 Mar 2018 03:08:28 AM PDT archive.org

A framework used by penetration testers for building custom exploits for infiltrating systems. Written in Ruby. Comes with a large library of payloads and other nifty and fascinating tools. It's worth learning to use if you're serious about penetration testing or exploit development. Also, the cutting edge of attack technologies winds up coming out of the Metasploit project.

code exploits secure wifi tools information malware pentest assembly web infosec wireless cracking networking ruby security hacking software
Reverse-Engineering Malware Cheat Sheet by Lenny Zeltser http://zeltser.com/reverse-malware/reverse-malware-cheat-sheet.html
Tue 20 Mar 2018 02:11:48 AM PDT archive.org

A cheat-sheet for reverse engineering malware, by Lenny Zeltser.

articles malware reverseengineering reference binary x86 reversing analysis research vm cheatsheet hacking unpacking
Hack-with-Github/Awesome-Hacking: A collection of various awesome lists for hackers, pentesters and security researchers https://github.com/Hack-with-Github/Awesome-Hacking
Mon 19 Mar 2018 10:31:29 PM PDT archive.org

Awesome list of curated hacking infosec pentesting resources.

malware exploits list awesome infosec pentesting ctf osint systems hacking os security resources
[lcamtuf.coredump.cx] http://lcamtuf.coredump.cx/
Mon 19 Mar 2018 07:59:07 PM PDT archive.org
code reference sysadmin technology networks hacker web malware privacy blog pentest resources security protocols science programming hacking software
Automated Malware Analysis | Cuckoo Sandbox http://www.cuckoosandbox.org/
Mon 19 Mar 2018 05:47:20 PM PDT archive.org

Cuckoo is a system emulator written in Python for analyzing malware. It automates much of the process of reverse engineering malware samples, such as tracing execution, snapshotting memorry, tracing API and function calls, and dumping network traffic. Generates reports at the end of execution. Modular design, so it's easily customizable.

malware python antivirus automation sandbox emulator analysis research tools reverseengineering
4803 links, including 361 private
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community - Theme by kalvn