SSMA is a simple malware analyzer written in Python 3. Features: Searches for websites, e-mail addresses, IP addresses in the strings of the file. Looks for Windows functions commonly used by malware. Get results from VirusTotal and/or upload files. Malware detection based on Yara-rules – https://virustotal.github.io/yara/ Detect well-known
Read more →Have you wanted to look inside the code of your Android application to see how it works? Here is a technique for you. I have done this on Kali. You can also perform this procedure on other Linux distros as well as Windows also (you need to download the
Read more →Taming your computer is your most enthusiastic dreams. Unfortunately, for many years, spyware spread on the Internet to infiltrate the recesses of your computer, observe all actions and alter behavior, bringing down your greatest wish. Spyware New internet scourges, these parasites – from simple cookie stored
Read more →============================================================================= === === = Intro to Win64 Assembly and Process Memory Dumping = === === ============================================================================= current_user 20160202 for Cybrary.it|0P3N Recently I’ve checked out the “Intro to Malware Analysis and Reverse Engineering” course by Sean Pierce. Inspired by his contribution and taking a rest from my
Read more →With U.S.-supplied, highly enriched uranium Iran was able to fuel a small nuclear reactor, effectively beginning their nuclear program in the 1960’s. Though advancement of the nuclear program slowed during the Islamic revolution and Iran-Iraq war, by the middle of the 1990’s, Iran publicly pursued continuation of
Read more →In this discussion, I’d like to talk little more about Malware in detail. I hope that this short tutorial is useful for you. I’m not going to tell you what Malware is and how to make it, because (almost) all of you know that Malware is malicious
Read more →Basics First, I’ll begin with the basics. Most applications consist of a Graphical User Interface or GUI, Middle-ware and or integrated logic and a database. These are the key components to being able to understand any application and how it functions. These components also can be combined
Read more →Recently in my internship, I was posed with a significant problem. One of the PCs at the company where I work was hit with a new kind of malware that got past all of our threat detection software. A user complained that our threat detection software was
Read more →