Alexandre Borges

@ale_sp_brazil

Reverse Engineer and Security Researcher. Speaker at DEF CON (USA and China), HITB, CONFidence, NO HAT, DC2711 and others. Author of the Malwoverview tool.

Brazil
Vrijeme pridruživanja: srpanj 2009.

Medijski sadržaj

  1. Pay attention when a malware is using Mailslots (similar to named pipes) for local communication on Windows: Mailslot Server (App. Client): CreateMailslot( ) + ReadFile( ) Mailslot Client (App. Server): CreateFile( ) + WriteFile( )

  2. 4. velj

    Few malware authors have been using thread's ownership changing to try to make analysis harder: void function2(std::thread x); .... std::thread function3(function1( )); function2(std::move(function3( ));

  3. 31. sij
  4. 18. sij

    No doubts, a quite interesting presentation from about the decompiler internals:

  5. 13. sij
  6. 12. sij
  7. 30. pro 2019.
    Odgovor korisniku/ci

    there isn't any problem with the malwoverview installation. When you installed it in a virtual environment, a copy of files are placed into the same directory, but the remaining Python's structures are kept. Please, if it's possible, so follow my step-by-step below.

  8. 30. pro 2019.
    Odgovor korisniku/ci

    Dear Kili, I've seen your report. However, I've repeat the test using a new Kali 2019 system and look at the sequence (including date) of image below... I'm going to reply you in the GitHub too. ;)

  9. 29. pro 2019.

    Malwoverview 2.0.7 is online! This version allows installation using pip: $ pip3.7 install malwoverview (Linux) $ python -m pip install malwoverviewwin (Windows) Further information is available on: (Github)

  10. 27. pro 2019.
  11. 24. pro 2019.
  12. 21. pro 2019.
  13. 19. pro 2019.
  14. 13. pro 2019.

    Finally: Malwoverview 2.0 (in Python 3.x) is available! There're so many news, so it's better to check on the GitHub ;)

  15. 10. pro 2019.
  16. 6. pro 2019.

    Slides from my presentation at the excellent DC2711 () in Johannesburg follow again:

  17. 2. pro 2019.
  18. 1. pro 2019.

    As I've promised, slides from my presentation at BHACK Conference 2019 follow below: Next year I'm planning to speak about other very interesting topics over the year. :)

  19. 27. stu 2019.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·