A Deep Dive into the OceanLotus Adversary Emulation for macOS & Linux
https://medium.com/mitre-engenuity/a-deep-dive-into-the-oceanlotus-adversary-emulation-for-macos-linux-26e521502866
https://medium.com/mitre-engenuity/a-deep-dive-into-the-oceanlotus-adversary-emulation-for-macos-linux-26e521502866
Medium
A Deep Dive into the OceanLotus Adversary Emulation for macOS & Linux
Written by L. Piper and Cat Self.
Beginners Guide to Building a Hardware Hacking Lab
https://voidstarsec.com/hw-hacking-lab/vss-lab-guide
https://voidstarsec.com/hw-hacking-lab/vss-lab-guide
VoidStar Security Wiki
VSS Hardware Hacking Wiki and Blog Entries
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16?gi=9da8f59fe944
https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16?gi=9da8f59fe944
guard.io
“EtherHiding” — Hiding Web2 Malicious Code in Web3 Smart Contracts
Order of Six Angles
Photo
а то бля заебало про одно байтоёбство читать 😂
BOOMSLANG Mobile fraud family analysis
https://www.liansecurity.com/#/main/news/mlRmJIwB203zX1eeD8-r/detail
https://www.liansecurity.com/#/main/news/mlRmJIwB203zX1eeD8-r/detail
Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell | CypherCon 6.0
https://www.youtube.com/watch?v=AOWFM-JhW3g&list=PLUC_sTnMl8NxZqs4b2Rt8VygLaquV5vY_
https://www.youtube.com/watch?v=AOWFM-JhW3g&list=PLUC_sTnMl8NxZqs4b2Rt8VygLaquV5vY_
YouTube
Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell | CypherCon 6.0
(S6:E57) Secret Handshake A Mutual TLS Based C2 Communication Channel - John Conwell - CypherCon 6.0 - Wisconsin
Secret Handshake A Mutual TLS Based C2 Communication Channel
One of the goals of malware command & control (C2) communication is to blend into…
Secret Handshake A Mutual TLS Based C2 Communication Channel
One of the goals of malware command & control (C2) communication is to blend into…
Obfuscating native code for fun: Part 1 - Introduction
https://blog.es3n1n.eu/posts/obfuscator-pt-1/
https://github.com/es3n1n/obfuscator
https://blog.es3n1n.eu/posts/obfuscator-pt-1/
https://github.com/es3n1n/obfuscator
blog.es3n1n.eu
Obfuscating native code for fun: Part 1 - Introduction
In this series of posts, I will try to cover all the common knowledge you would need to create your PE bin2bin obfuscator. This year I saw a rise of interest in the topics of software obfuscation and deobfuscation, yet I didn’t see any new open-source projects…
Ghidra Basics - Identifying, Decoding and Fixing Encrypted Strings
https://embee-research.ghost.io/ghidra-basics-identifying-and-decoding-encrypted-strings/
https://embee-research.ghost.io/ghidra-basics-identifying-and-decoding-encrypted-strings/
Embee Research
How To Use Ghidra For Malware Analysis - Identifying, Decoding and Fixing Encrypted Strings
Manual identification, decryption and fixing of encrypted strings using Ghidra and x32dbg.