Daniel Plohmann

@push_pnx

Reverse Engineering & Malware Analysis Research . Blog: || Projects: | | | |

DE
Vrijeme pridruživanja: srpanj 2011.

Tweetovi

Blokirali ste korisnika/cu @push_pnx

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @push_pnx

  1. proslijedio/la je Tweet
    31. sij

    I keep forgetting how to use the Python bindings for the Unicorn Engine, so I created a nice README for it. I plan to add a complete code walkthrough but for now it’s still a nice reference.

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    . now shows URLs as meta data enriched entries with titles, date, authors, and more. Check entries for here!

    Poništi
  3. proslijedio/la je Tweet
    23. sij

    .blackfriday, .tickets and .feedback top-level domains? Of course that's a thing. And they are even used by domain generation algorithms:

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    🎉 New feature: the Malpedia Library! Thanks to significant community efforts, all URLs are now shown as meta data enriched entries with titles, date, authors, and more!

    Poništi
  5. proslijedio/la je Tweet
    17. sij

    I'm putting together a little project for newcomers to cyber/security, & would love to poll as many people as possible in the roles shown below (which ones did I miss?). Can be as simple/detailed as you like: * Your responsibilities * Pros * Cons DM/comment & RTs appreciated!

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    3. sij

    🚀 Launch Day 🚀 It’s official this project that and I have been a part of for 5 years is now available as a free public Beta! Automated malware unpacking!

    Poništi
  7. 30. pro 2019.

    Having spent a good amount of time with various zeus derivates over the last couple years myself, I must say that this is an absolutely amazing collection and project! Go check it out! ⚡

    Poništi
  8. proslijedio/la je Tweet
    7. pro 2019.

    Here are the slides for the talk by me on DeStroid in automatically deobfuscate encrypted strings in Android malware. Including some bonus slides:)

    Poništi
  9. 6. pro 2019.

    Here are the slides for the talk by and me on YARA-Signator, a tool for automated generation of code-based YARA signatures for ! Including some bonus slides on statistics for the 157,806,663 instructions processed. :) ->

    Poništi
  10. proslijedio/la je Tweet
    21. stu 2019.

    Our amazing malware research group had the perfect way to celebrate its two-year anniversary. We had an online party of malware research with members and presenters from all around the world. Now we are happy to share the presentations with the community!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    14. lis 2019.

    ⚒️ Dear friends of - your help is requested! We want to upgrade the references (almost 4,000 entries!) with additional meta data 📝. Everyone can help and even a few entries go a long way! The interface for transformation can be found here:

    Poništi
  12. 4. lis 2019.

    Hahaha, I kinda forgot about that SMB share on one of my (batch) dynamic analysis VMs... Just found ~800 files of multi-encrypted garbage from various ransomware runs. ¯\_(ツ)_/¯

    Poništi
  13. proslijedio/la je Tweet
    1. lis 2019.

    The complete detailed schedule is now online

    Poništi
  14. proslijedio/la je Tweet
    24. srp 2019.

    My colleague Peter and I are giving a workshop on at this year's The Hague. Workshop will include CTF style exercises in firmware security analysis

    Poništi
  15. 16. ruj 2019.

    Looking forward to make another appearance at this year! Happy to make my 6th conference contribution, this time as co-author on 's paper/talk on automated generation of code-based YARA signatures. 📝🔎👾

    Poništi
  16. proslijedio/la je Tweet
    13. ruj 2019.

    The schedule is progressively being published for

    Poništi
  17. 23. kol 2019.

    Fellow hexdump junkies can possibly relate?

    Poništi
  18. proslijedio/la je Tweet
    14. kol 2019.
    Poništi
  19. proslijedio/la je Tweet
    14. kol 2019.

    Added 's auto generated rules from () which contains a zip file of all automatically generated, code-based rules

    Poništi
  20. proslijedio/la je Tweet
    8. kol 2019.

    Big thanks to for providing a platform to present our open source security tools. We look forward to coming back next year (cc )

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·