Category: Malware Analysis

pdfxpose

pdfxpose: detecting suspicious PDF modifications

pdfxpose – A security tool for detecting suspicious PDF modifications commonly found in BEC. While investigating Business Email Compromise (BEC), suspicious indicators were discovered in a majority of the PDFs...

Linux Process Hunter

prochunter: Linux Process Hunter

Linux Process Hunter I wrote prochunter around 2002, after the SuckIT rootkit release by sd [4], I just spent few hours to make it runnable on modern kernels (tested on...

[Ebook] Radare2 Explorations

Table of Contents Introduction The Basics Getting Information Modes of Operation Navigation Visual Navigation Debugging Visual Debugging Editing Visual Graphs Project Management Configuration Tutorials Simple Patch Memory Manipulation ESIL Simple...

sheep-wolf: Wolves Among the Sheep

Wolves Among the Sheep Some security tools still stick to MD5 when identifying malware samples years after practical collisions were shown against the algorithm. This can be exploited by first showing these...

Automates Malware Evaluation

FAME: Automates Malware Evaluation

FAME is a recursive acronym meaning “FAME Automates Malware Evaluation”. It is meant to facilitate analysis of malicious files, leveraging as much knowledge as possible in order to speed up...