Skip to content
MalwareAnalysis.co

MalwareAnalysis.co

Malware Analysis Resources and Courses

  • Our Courses
  • Research Publications
  • Resources
    • Tools
      • Windows
      • macOS
      • Linux
      • Android
    • Malware Samples
    • Cheat Sheets
    • Sandboxes
    • Threat Intelligence
    • Labs & CTFs
    • Books
  • Community
    • Twitters to Follow
    • Forums and Blogs
  • About Us
  • Contact Us

Contact Us

    Share this:

    • Click to share on Twitter (Opens in new window)
    • Click to share on LinkedIn (Opens in new window)
    • Click to share on Facebook (Opens in new window)
    • Click to share on WhatsApp (Opens in new window)
    • Click to share on Telegram (Opens in new window)

    Twitter Feed

    malfuzzer Uriel Kosayev @malfuzzer ·
    6 Aug

    Updating that I’m speaking @BSidesLV in the Breaking Ground track from 11:30 to 12:25. My talk is called “Malware Analysis - Red Team Edition”. Hope to see you there 😎❤️

    Reply on Twitter 1555976587119673344 Retweet on Twitter 1555976587119673344 4 Like on Twitter 1555976587119673344 29 Twitter 1555976587119673344
    Retweet on Twitter Uriel Kosayev Retweeted
    bsideslv BSides Las Vegas @bsideslv ·
    6 Aug

    We will be livestreaming almost all of the presentations at BSidesLV! Streams will be on our YouTube channel during the conference, or visit later for the full recordings.

    https://www.youtube.com/c/BsideslvOrg

    Reply on Twitter 1555931888795230208 Retweet on Twitter 1555931888795230208 29 Like on Twitter 1555931888795230208 44 Twitter 1555931888795230208
    malfuzzer Uriel Kosayev @malfuzzer ·
    5 Aug

    Which makes everything much easier

    Andy Robbins @_wald0

    Red teamers: understand that in almost all instances, you do not need to execute your Azure abuses from a system your target manages. Azure is primarily API based. Those APIs are (nearly always) exposed to the internet.

    Your customer isn't running EDR on YOUR machine.

    Reply on Twitter 1555565392336134145 Retweet on Twitter 1555565392336134145 Like on Twitter 1555565392336134145 5 Twitter 1555565392336134145
    Retweet on Twitter Uriel Kosayev Retweeted
    ret2_pwn RET2pwn @ret2_pwn ·
    5 Aug

    Hey everyone!
    It's time to announce unreleased C2 project I'm working on called Falcone One.
    I wanted to share some of the achievements in a thread.
    #redteam

    Reply on Twitter 1555523051088973825 Retweet on Twitter 1555523051088973825 55 Like on Twitter 1555523051088973825 248 Twitter 1555523051088973825
    Retweet on Twitter Uriel Kosayev Retweeted
    0gtweet Grzegorz Tworek @0gtweet ·
    3 Aug

    The tool I hope you will never have to use. But if you do some Incident Response, collecting the volatile data is a must. And the tool does it. Neatly and fast. C source code, and the compiled EXE, as usual - https://github.com/gtworek/VolatileDataCollector
    It collects: 👇

    Reply on Twitter 1554704323111784448 Retweet on Twitter 1554704323111784448 110 Like on Twitter 1554704323111784448 394 Twitter 1554704323111784448
    • Our Courses
    • Research Publications
    • Resources
      • Tools
        • Windows
        • macOS
        • Linux
        • Android
      • Malware Samples
      • Cheat Sheets
      • Sandboxes
      • Threat Intelligence
      • Labs & CTFs
      • Books
    • Community
      • Twitters to Follow
      • Forums and Blogs
    • About Us
    • Contact Us
    MalwareAnalysis.co Proudly powered by WordPress