Malware analysis Gozi ISFB – Bank Trojan aka Ursnif
Introduction: Discussing the Evolving Threat of Ursnif (GOZI/ ISFB) Malware in Cybersecurity In the dynamic landscape of cybersecurity, professionals are
Read MoreIntroduction: Discussing the Evolving Threat of Ursnif (GOZI/ ISFB) Malware in Cybersecurity In the dynamic landscape of cybersecurity, professionals are
Read MoreSome work from Prodefence Team. 01-08.2018
Read More“I do not think the file is infected …” All of these are a part of the extracted files from
Read MoreLooks like someone really wants a lot from the victims. Files with more than one malware. As usual found on
Read MoreHello. I found something interesting for today. The form i found the file is the classic one: Hacking forum-> Magic
Read MoreHello. I have some free time and I try to deal with internet safety. I’m just a small drop of
Read MoreHello again. After a few tested files, I found something good to analyze. On hacking or warez forums, you find
Read MoreMany of us are trying to make money online from home. One solution would be the websites that offer some
Read MoreTROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to:
Read Morehashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over
Read MoreWe are excited to announce this major release of auditing tool Lynis. Several big changes have been made to
Read MoreExitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run
Read MoreNikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items,
Read MoreA Simple tool for installing pentest tools and forensic tools on Debian / Ubuntu Based OS Tested on Linux
Read MoreMassive SQL injection vulnerability scanner. Features multiple domain scanning with SQL injection dork by Bing, Google, or Yahoo targetted scanning
Read MoreThere are some features that we think SQLMap should have. Like finding admin panel of the target, better hash cracking
Read More[amazon_link asins=’0128016353,1597495867,1285060032,1785887106,1517713609′ template=’ProductCarousel’ store=’secure001a-20′ marketplace=’US’ link_id=’2f9f1c3b-bd4c-11e7-b344-27bce27720b0′] Autopsy® is a digital forensics platform and graphical interface to The Sleuth Kit® and
Read MoreI found some ”free” software on the internet backdoored with that Silent Minergate, so this time i downloaded the
Read MoreCryptography falls into the sixth and last domain of CompTIA’s Security+ exam (SYO-401) and contributes 12% to the exam score.
Read MoreIntroduction The “access control and identity management” domain is aimed at teaching and testing on industry-accepted practices, such as determining
Read MoreApplication, data, and host Security falls into the fourth domain of CompTIA’s Security+ exam (SYO-401) and contributes 15% to the
Read MoreIntroduction Threats and vulnerabilities fall into the third domain of CompTIA’s Security+ exam (SYO-401) and contribute 20% to the exam
Read MoreCompliance and operations security falls into the second domain of CompTIA’s Security+ exam (SYO-401) and contributes 18% to the exam
Read MoreIntroduction Network security falls into the first domain of CompTIA’s Security+ exam (SYO-401) and contributes 20% to the exam score.
Read MoreNmap Scripting Engine Search Description Nsearch is a tool that helps you to find scripts that are used by nmap
Read MoreMISP – Malware Information Sharing Platform and Threat Sharing MISP, Malware Information Sharing Platform, and Threat Sharing is an open
Read MoreCSRFT – Cross Site Request Forgeries (Exploitation) Toolkit Introduction Description This project has been developed to exploit CSRF Web vulnerabilities
Read MoreManticore is a prototyping tool for dynamic binary analysis, with support for symbolic execution, taint analysis, and binary instrumentation. Features
Read MoreSecurity Monkey Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. It provides a
Read MoreBurp Suite extension is able to find reflected XSS on page in real-time while browsing on web-site and include some
Read More