Maggie

@chubbymaggie

Ph.D; Interested in system security, program analysis, , , malware analysis, threat intelligence and

Vrijeme pridruživanja: siječanj 2011.

Tweetovi

Blokirali ste korisnika/cu @chubbymaggie

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @chubbymaggie

  1. proslijedio/la je Tweet
    2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  2. proslijedio/la je Tweet
    29. sij

    1\ I've written a little compiler to ship ML models as standalone Yara rules, and done proof of concept detectors for Macho-O, RTF files, and powershell scripts. So far I have decision trees, random forests, and logistic regression (LR) working.

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    2. velj

    I've been wracking my brain on this. In an incognito browser, which was not logged into FB or IG, I was comparing credit cards to get a new one. Then closed browser shut computer down. The next day I saw an ad on instagram, for the same exact card I was looking at.

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    GitHub - redcanaryco/chain-reactor: Chain Reactor is an open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.

    Poništi
  5. proslijedio/la je Tweet
    2. velj

    GDA Android Reversing Tool - A New Decompiler Written Entirely In C++, So It Does Not Rely On The Java Platform, Which Is Succinct, Portable And Fast, And Supports APK, DEX, ODEX, Oat

    Poništi
  6. proslijedio/la je Tweet
    30. sij

    WAFs OSS and paid, in a list

    Poništi
  7. proslijedio/la je Tweet
    30. sij

    Want to uncover some secrets from Twitter? Check the article about Twint - The Twitter OSINT tool from our edition about Open Source Intelligence!

    Poništi
  8. proslijedio/la je Tweet
    30. sij

    My write-up on how I tracked down an alleged member of REvil group utilizing methods. If you enjoyed reading this please share it and I will work hard to create more write-ups like this!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    30. sij
    Poništi
  10. proslijedio/la je Tweet
    28. sij

    1\ Surprisingly, you could build a very mediocre PE malware detector with a single PE feature: the PE compile timestamp. In fact, I built a little random forest detector that uses only the timestamp as its feature that gets 62% detection on previously unseen malware at a 1% FPR.

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    28. sij

    ALERT, ALERT, ALERT. The great folks at Qualys have discovered a critical vulnerability in . Please read this, upgrade ASAP and RT so people get patched out as soon as possible. We'll write about it when things settle down.

    Poništi
  12. proslijedio/la je Tweet
    28. sij

    Our paper about how community-generated API usage data may inform better API design is now available online.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    29. sij

    We still have open positions, let me know if you are looking for an internship in Program Synthesis this summer! Preferred: experience with deep learning, NLP, and search. Current (or accepted) PhD enrollment required.

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    CredNinja - A Multithreaded Tool Designed To Identify If Credentials Are Valid, Invalid, Or Local Admin Valid Credentials Within A Network At-Scale Via SMB, Plus Now With A User Hunter

    Poništi
  15. proslijedio/la je Tweet
    28. sij

    Some things make more sense when one realizes that there are at least 5 distinct security communities: Security product people (people that view security as something that can be added by buying/selling products), Security Infrastructure people (people that view security as ...

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    27. sij

    Our talk "Catch me if you can! Detecting Sandbox Evasion Techniques" at presented by ✨ Be smarter than adversaries and make your Sandbox Systems stronger 💪

    Poništi
  17. proslijedio/la je Tweet
    27. sij

    Amazing: a termite track (top) and an ant track (bottom) • each travelling insect is protected by its own column of soldiers, no fights necessary | 📹 via Mehdi Moussaid

    Poništi
  18. proslijedio/la je Tweet
    27. sij

    Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.

    Poništi
  19. proslijedio/la je Tweet
    26. sij

    Log Sources - ordered by priority - with ratings in different categories - personal and highly subjective assessment - from my most recent slide deck on low hanging fruits in security monitoring

    Poništi
  20. proslijedio/la je Tweet
    9. pro 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·