Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @herrcore
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @herrcore
-
herrcore proslijedio/la je Tweet
Here’s an IDAPython script that I have been using to populate comments and enum constants for Windows Crypto API. I still need to figure out how to search by constants by name, populate enums with multiple values and add more APIs but it’s still useful.https://gist.github.com/alexander-hanel/3d2fbf9b15d34964416f592b60b47d2e …
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New Tutorial Video
Learn how to automaticaly decrypt #REvil strings with#IDAPro and python
The 4th part in our reverse engineering #ransomware deep-dive series.
https://youtu.be/l2P5CMH9TE0
#OpenAnalysisLive#Malware#tutorialsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
New feature: the Malpedia Library!
Thanks to significant community efforts, all URLs are now shown as meta data enriched entries with titles, date, authors, and more!
https://malpedia.caad.fkie.fraunhofer.de/library pic.twitter.com/bXjLOMRKCy
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Also using the new TWidget interface for interacting with IDA actions was pretty confusing for me... if anyone has a good tutorial suggestion (or wants to clean up my code) I would be super grateful
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Finally ported my Hex Copy IDA plugin to the new IDA 7 API... One-click copy bytes as encoded hex
** literally only saves me one extra click using native IDA commands but is by far my favourite plugin
https://gist.github.com/herrcore/01762779ae4ac130d3beb02bf8e99826 …Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
hey suckers. read the bottom of this : https://paste.cryptolaemus.com/emotet/2020/01/16/emotet-malware-IoCs_01-16-20.html … the
@Cryptolaemus1 crew has been burning their personal time to track and report Emotet, move for move, for (checks notes) over 1.5 years. it probably can't go like that for ever without some support.Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Research Brain-Dump
Join us for a deep dive into the how’s and why’s of automated malware unpacking.
In this video we discuss how we built UnpacMe!https://youtu.be/FctDptnYukQ Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Launch Day
It’s official this project that @seanmw and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking! https://www.unpac.me/#malware#ReverseEngineering#automation#toolsHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
Public Beta Is Open
It’s 2020 and we are live! No more registration codes! Come sign up and start unpacking!!
This is still in beta so submissions may be limited and things will break. Let us know if you encounter any issues
https://www.unpac.me/ Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Some of you may have noticed this guy in our recent videos. We have been fostering him for the past few months and this week he officially became part of our family. Merry Christmas
pic.twitter.com/tz72CEPO9k
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
Yay, today we finally passed 50%! Many thanks to the more than 50 people who contributed so far and helped enriching references with more meta data! If you want to support us, please consider filling out a couple of these forms
https://malpedia.caad.fkie.fraunhofer.de/library/translate … https://twitter.com/malpedia/status/1183744596863520768 …pic.twitter.com/kYpO9wfg7F
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
When I triage malware, I use my violently over-engineered collection of command line scripts in
#Python with a custom DSL. And now they're open source! - https://github.com/binref/refinery/ … - https://pypi.org/project/binary-refinery/ … - https://binref.github.io/ Work in progress. Bug reports welcome. Enjoy!Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Just found this awesome talk from 2017... “Everything You Ever Wanted to Know About DLLs” Highly recommend for folks who are getting started with reverse engineering.


@JamesMcNellishttps://youtu.be/JPQWQfDhICAHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
The outline of my upcoming 4-days
#MalwareAnalysis training at@_ringzer0 : https://ringzer0.training/advanced-windows-malware-analysis.html …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
New Tutorial Video
Intro to scripting with Python and #IDAPro
Learn how to automate resolving the #REvil#ransomware dynamic API calls
https://youtu.be/R4xJou6JsIE
#OpenAnalysisLive#MalwareAnalysis#IDAPythonHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
My latest video analyses a lesser-known technique of Process Injection using Excel 4.0 Macros. Thanks to
@w1zzcap for the sample. Hope you all enjoy! https://youtu.be/XnN_UWfHlNM via@YouTube#malwareHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
Anyone interested in a Quick step by step on how to use my tools to get what the Powershell/ shellcode is doing? You will also Need your favorite text editor and my tools here https://github.com/PCsXcetra/DerbyCon-2019Files/blob/master/ShellCode-Tools-Only.7z … Nothing worse than seeing an interesting tool but not being able to use it.
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
Our amazing malware research group had the perfect way to celebrate its two-year anniversary. We had an online party of malware research with members and presenters from all around the world. Now we are happy to share the presentations with the community!https://malware-research.org/two-years-malware-research-slack-group-event-anniversery/ …
Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
herrcore proslijedio/la je Tweet
Finally finished a lengthy blog post on API hashing in the Sodinokibi/REvil ransomware: https://blag.nullteilerfrei.de/2019/11/09/api-hashing-why-and-how/ … In the post, I explain how API hashing works in general and then lose myself in technical details.
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Awesome step-by-step breakdown of how to analyze malicious shell code using
#BlobRunner and other free tools
https://twitter.com/Ledtech3/status/1189012010350108672 …Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.