Hunting for Malware.pdf
2.7 MB
📚HUNTING FOR MALWARE WITH COMMAND LINE LOGGING AND PROCESS TREES
@hypersec
#malware #process
شرکت دانش بنیان سورین
@hypersec
#malware #process
شرکت دانش بنیان سورین
🐺Freki is a free and open-source malware analysis platform.
🔗https://github.com/cristianzsh/freki
@hypersec
#malware
تیم سورین
🔗https://github.com/cristianzsh/freki
@hypersec
#malware
تیم سورین
GitHub
GitHub - cristianzsh/freki: :wolf: Malware analysis platform
:wolf: Malware analysis platform. Contribute to cristianzsh/freki development by creating an account on GitHub.
👁🗨Awesome Malware Analysis
A curated list of awesome malware analysis tools and resources.
🔗https://github.com/rshipp/awesome-malware-analysis
@hypersec
#malware
تیم سورین
A curated list of awesome malware analysis tools and resources.
🔗https://github.com/rshipp/awesome-malware-analysis
@hypersec
#malware
تیم سورین
GitHub
GitHub - rshipp/awesome-malware-analysis: Defund the Police.
Defund the Police. Contribute to rshipp/awesome-malware-analysis development by creating an account on GitHub.
👍1
👹Malware Analysis Tools👾
Mindmap of links:
Encoding/Decoding tools
File Carving tools
Memory Forensics
Online scanners
Malware analysis tools
Debuggers/Decompliers
🔗https://malwareanalysis.tools/
#malware
تیم سورین
Mindmap of links:
Encoding/Decoding tools
File Carving tools
Memory Forensics
Online scanners
Malware analysis tools
Debuggers/Decompliers
🔗https://malwareanalysis.tools/
#malware
تیم سورین
malwareanalysis.tools
Malware Analysis Tools
Malware analysis tools list
🕵🏻♀️☠️ SEMA ☠️ - ToolChain using Symbolic Execution for Malware Analysis.
📎 https://github.com/csvl/SEMA-ToolChain
#malware
تیم سورین
📎 https://github.com/csvl/SEMA-ToolChain
#malware
تیم سورین
GitHub
GitHub - csvl/SEMA: SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with…
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph ...
👾PE-bear
PE-bear is a multiplatform reversing tool for PE files. Its objective is to deliver fast and flexible “first view” for malware analysts, stable and capable to handle malformed PE files.
🔗https://github.com/hasherezade/pe-bear
#malware
تیم سورین
PE-bear is a multiplatform reversing tool for PE files. Its objective is to deliver fast and flexible “first view” for malware analysts, stable and capable to handle malformed PE files.
🔗https://github.com/hasherezade/pe-bear
#malware
تیم سورین
GitHub
GitHub - hasherezade/pe-bear: Portable Executable reversing tool with a friendly GUI
Portable Executable reversing tool with a friendly GUI - GitHub - hasherezade/pe-bear: Portable Executable reversing tool with a friendly GUI
/ بدافزار WogRAT از یک Notepad (ویندوز، لینوکس) سوء استفاده می کند
این مقاله در مورد بدافزاری به نام WogRAT است. روش های توزیع WogRAT و نحوه آلوده کردن سیستم های ویندوز و لینوکس را مورد بحث قرار می دهد. این بدافزار خود را به عنوان برنامه های کاربردی قانونی پنهان می کند. پس از دانلود، WogRAT اطلاعات را از سیستم آلوده جمع آوری کرده و به سرور فرمان و کنترل (C&C) ارسال می کند. سپس سرور C&C می تواند دستورات را به سیستم آلوده ارسال کند.
#windows #linux #malware
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM