tmr0919

16 Flips | 2 Magazines | 2 Likes | 2 Following | 2 Followers | @tmr0919 | Keep up with tmr0919 on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “tmr0919”

Stress Test Anti Malware System: al-khaser

al-khaser is a PoC malware with good intentions that aims to stress your anti-malware system. It performs a bunch of nowadays malwares tricks and the …

Cybersecurity

Awesome Malware Analysis

A curated list of awesome malware analysis tools and resources. Inspired by awesome-python and awesome-php.<p>Malware …

Windows registry file format specification

Table of contents<p>Types of files<p>Examples of hives and supporting files<p>Windows 8.1: System hive<br>• Windows 8.1: BCD hive<br>• Windows Vista: System hive<br>• Windows …

Databases

Memory Forensics

Contents<p>Introduction<p>This mini-course started with forensic memory basics, in this mini-course, we have explained how you can and what you can find …

高逼格的行李打包术,一个都不能错过

Wfuzz – Web Application Brute Forcer

Wfuzz is a Python based flexible web application brute forcer which supports various methods and techniques to expose web application …

WriteBlocking Validation Utility - CRU

The CRU WriteBlocking Validation Utility provides an easy-to-use method to determine if a hardware writeblocker blocks low-level hard drive …

Using reverse engineering techniques to see how a common malware packer works

<b>UPX (Ultimate Packer for eXecutables) is an open source executable packer that is common in the malware scene (albeit often heavily modified). UPX</b> …

Data Retention Laws By Country

Below is a chart outlining data retention laws in various countries around the world. We have created blog posts with more detail around several of …

Tools

This post is the first in a series of posts on a “A Practical Guide to Cracking Password Hashes”. Cracking passwords is an important part of …

8 Most Popular and Best Hacking Tools

<i>The internet has as many downsides as well as upsides but it’s the lack of knowledge about dangers on users’ behalf makes it easier for hackers to go</i> …

Backdoor infecting Cisco VPNs steals customers’ network passwords

Dozens of successful attacks detected that install malicious code on company portals.<p>Attackers are infecting a widely used virtual private network …

Incident Response – Memory Analysis

We are all super impressed with the new tool; you guys really hit it out of the park.<p>Federal Law Enforcement Agency<p>Volexity functions integrally to …

Network security company reveals attacks on Hong Kong media outlets by Chinese hackers

FireEye, a US-based network security company, has released the results of its research into a recent campaign carried out by a Chinese cyber threat …

Russians Have Learned to Hack Power Grids

A successful cyber-attack on a power grid is a nightmare that keeps intelligence services and security experts awake at night. Now the threat is no …

Cybersecurity