Tweetovi

Blokirali ste korisnika/cu @herrcore

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @herrcore

  1. proslijedio/la je Tweet
    17. sij

    Here’s an IDAPython script that I have been using to populate comments and enum constants for Windows Crypto API. I still need to figure out how to search by constants by name, populate enums with multiple values and add more APIs but it’s still useful.

    Poništi
  2. 27. sij

    📺 New Tutorial Video 📺 Learn how to automaticaly decrypt strings with and python 🐍 The 4th part in our reverse engineering deep-dive series. 👾🔍

    Poništi
  3. proslijedio/la je Tweet
    22. sij

    🎉 New feature: the Malpedia Library! Thanks to significant community efforts, all URLs are now shown as meta data enriched entries with titles, date, authors, and more!

    Poništi
  4. 25. sij

    Also using the new TWidget interface for interacting with IDA actions was pretty confusing for me... if anyone has a good tutorial suggestion (or wants to clean up my code) I would be super grateful 👨‍🎓

    Prikaži ovu nit
    Poništi
  5. 25. sij

    Finally ported my Hex Copy IDA plugin to the new IDA 7 API... One-click copy bytes as encoded hex 😇 ** literally only saves me one extra click using native IDA commands but is by far my favourite plugin 🤷‍♂️

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    17. sij

    hey suckers. read the bottom of this : the crew has been burning their personal time to track and report Emotet, move for move, for (checks notes) over 1.5 years. it probably can't go like that for ever without some support.

    Poništi
  7. 6. sij

    🧠Research Brain-Dump🧠 Join us for a deep dive into the how’s and why’s of automated malware unpacking. In this video we discuss how we built UnpacMe!

    Poništi
  8. 3. sij

    🚀 Launch Day 🚀 It’s official this project that and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking!

    Poništi
  9. proslijedio/la je Tweet
    3. sij

    🥂 Public Beta Is Open 🥂 It’s 2020 and we are live! No more registration codes! Come sign up and start unpacking!! This is still in beta so submissions may be limited and things will break. Let us know if you encounter any issues 📟

    Poništi
  10. 22. pro 2019.

    Some of you may have noticed this guy in our recent videos. We have been fostering him for the past few months and this week he officially became part of our family. Merry Christmas 💞

    Poništi
  11. proslijedio/la je Tweet
    20. pro 2019.

    Yay, today we finally passed 50%! Many thanks to the more than 50 people who contributed so far and helped enriching references with more meta data! If you want to support us, please consider filling out a couple of these forms ➡️

    Poništi
  12. proslijedio/la je Tweet
    16. pro 2019.

    When I triage malware, I use my violently over-engineered collection of command line scripts in with a custom DSL. And now they're open source! - - - Work in progress. Bug reports welcome. Enjoy!

    Poništi
  13. 15. pro 2019.

    Just found this awesome talk from 2017... “Everything You Ever Wanted to Know About DLLs” Highly recommend for folks who are getting started with reverse engineering. 🤜🤛

    Poništi
  14. proslijedio/la je Tweet
    9. pro 2019.
    Poništi
  15. 1. pro 2019.

    📺 New Tutorial Video 📺 Intro to scripting with Python and 🐍 Learn how to automate resolving the dynamic API calls ⚙️

    Poništi
  16. proslijedio/la je Tweet
    26. stu 2019.

    My latest video analyses a lesser-known technique of Process Injection using Excel 4.0 Macros. Thanks to for the sample. Hope you all enjoy! via

    Poništi
  17. proslijedio/la je Tweet
    24. stu 2019.

    Anyone interested in a Quick step by step on how to use my tools to get what the Powershell/ shellcode is doing? You will also Need your favorite text editor and my tools here Nothing worse than seeing an interesting tool but not being able to use it.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    21. stu 2019.

    Our amazing malware research group had the perfect way to celebrate its two-year anniversary. We had an online party of malware research with members and presenters from all around the world. Now we are happy to share the presentations with the community!

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    9. stu 2019.

    Finally finished a lengthy blog post on API hashing in the Sodinokibi/REvil ransomware: In the post, I explain how API hashing works in general and then lose myself in technical details.

    Poništi
  20. 29. lis 2019.

    Awesome step-by-step breakdown of how to analyze malicious shell code using and other free tools 💪

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·