unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
Reversing Android Native Libraries - Coper Notes
访问页面时出现“Oops, page not found”错误提示,建议检查路径或联系管理员解决问题。...
2025-12-24 11:4:47 | 阅读: 2 |
收藏
|
Over Security - Cybersecurity news aggregator - viuleeenz.github.io
oops
viuleeenz
From one to many - one IOC to hunt them ALL
文章介绍了一种基于Gremlin Stealer恶意软件的威胁狩猎方法。通过分析静态特征(如文件哈希、元数据)和动态行为(如网络通信、文件操作),提取关键指标,并结合VirusTotal查询和YARA规则构建检测策略。同时,通过关联恶意软件基础设施(如C2服务器、控制面板),进一步识别相关样本和威胁行为者。该方法展示了如何从单一样本出发,系统性地提升检测能力并理解威胁行为者的活动模式。...
2025-8-29 10:18:41 | 阅读: 21 |
收藏
|
Over Security - Cybersecurity news aggregator - viuleeenz.github.io
gremlin
stealer
analysis
behavioral
attribution
Symbolic Execution for fun and Flare-on
Emulation is my passion. I apply it as much as I can in countless scenarios—sometimes for p...
2024-12-27 17:31:27 | 阅读: 11 |
收藏
|
Over Security - Cybersecurity news aggregator - viuleeenz.github.io
angr
bytecode
memory
interpreter
machine
Emulating inline decryption for triaging C++ malware
What we need to know?C and C++ binaries share several commonalities, however, some additio...
2024-5-17 07:31:58 | 阅读: 6 |
收藏
|
Over Security - Cybersecurity news aggregator - viuleeenz.github.io
hashing
dealing
analysis
taurus
glorysprout
Understanding API Hashing and build a rainbow table for LummaStealer
Understanding PEB and Ldr structures represents a starting point when we are dealing with A...
2024-3-25 09:1:59 | 阅读: 12 |
收藏
|
Over Security - Cybersecurity news aggregator - viuleeenz.github.io
hashing
b6
collecting
Previous
1
2
3
4
5
6
7
8
Next