Skip to content
MalwareAnalysis.co

MalwareAnalysis.co

Malware Analysis Resources and Courses

  • Our Courses
  • Research Publications
  • Resources
    • Tools
      • Windows
      • macOS
      • Linux
      • Android
    • Malware Samples
    • Cheat Sheets
    • Sandboxes
    • Threat Intelligence
    • Labs & CTFs
    • Books
  • Community
    • Twitters to Follow
    • Forums and Blogs
  • About Us
  • Contact Us

Community

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)
  • Click to share on Telegram (Opens in new window)

Twitter Feed

malfuzzer Uriel Kosayev @malfuzzer ·
6 Aug

Updating that I’m speaking @BSidesLV in the Breaking Ground track from 11:30 to 12:25. My talk is called “Malware Analysis - Red Team Edition”. Hope to see you there 😎❤️

Reply on Twitter 1555976587119673344 Retweet on Twitter 1555976587119673344 4 Like on Twitter 1555976587119673344 29 Twitter 1555976587119673344
Retweet on Twitter Uriel Kosayev Retweeted
bsideslv BSides Las Vegas @bsideslv ·
6 Aug

We will be livestreaming almost all of the presentations at BSidesLV! Streams will be on our YouTube channel during the conference, or visit later for the full recordings.

https://www.youtube.com/c/BsideslvOrg

Reply on Twitter 1555931888795230208 Retweet on Twitter 1555931888795230208 29 Like on Twitter 1555931888795230208 44 Twitter 1555931888795230208
malfuzzer Uriel Kosayev @malfuzzer ·
5 Aug

Which makes everything much easier

Andy Robbins @_wald0

Red teamers: understand that in almost all instances, you do not need to execute your Azure abuses from a system your target manages. Azure is primarily API based. Those APIs are (nearly always) exposed to the internet.

Your customer isn't running EDR on YOUR machine.

Reply on Twitter 1555565392336134145 Retweet on Twitter 1555565392336134145 Like on Twitter 1555565392336134145 5 Twitter 1555565392336134145
Retweet on Twitter Uriel Kosayev Retweeted
ret2_pwn RET2pwn @ret2_pwn ·
5 Aug

Hey everyone!
It's time to announce unreleased C2 project I'm working on called Falcone One.
I wanted to share some of the achievements in a thread.
#redteam

Reply on Twitter 1555523051088973825 Retweet on Twitter 1555523051088973825 55 Like on Twitter 1555523051088973825 248 Twitter 1555523051088973825
Retweet on Twitter Uriel Kosayev Retweeted
0gtweet Grzegorz Tworek @0gtweet ·
3 Aug

The tool I hope you will never have to use. But if you do some Incident Response, collecting the volatile data is a must. And the tool does it. Neatly and fast. C source code, and the compiled EXE, as usual - https://github.com/gtworek/VolatileDataCollector
It collects: 👇

Reply on Twitter 1554704323111784448 Retweet on Twitter 1554704323111784448 110 Like on Twitter 1554704323111784448 394 Twitter 1554704323111784448
  • Our Courses
  • Research Publications
  • Resources
    • Tools
      • Windows
      • macOS
      • Linux
      • Android
    • Malware Samples
    • Cheat Sheets
    • Sandboxes
    • Threat Intelligence
    • Labs & CTFs
    • Books
  • Community
    • Twitters to Follow
    • Forums and Blogs
  • About Us
  • Contact Us
MalwareAnalysis.co Proudly powered by WordPress