#unprotectproject search results

#100DaysOfYara Day 15: Wrote a rule for notorious open source crypter malware LimeCrypter. Detecting the RunPE code based on hardcoded constants. Also contributing it to #UnprotectProject github.com/cod3nym/detect…

cod3nym's tweet image. #100DaysOfYara Day 15: 
Wrote a rule for notorious open source crypter malware LimeCrypter. Detecting the RunPE code based on hardcoded constants. Also contributing it to #UnprotectProject

github.com/cod3nym/detect…

👽 A new technique, named "FuncIn", has been integrated to #UnprotectProject, showcasing a sophisticated evasion technique with a working open-source demo. In short, FuncIn employs a payload staging strategy, diverging from the conventional method where all malicious…

DarkCoderSc's tweet image. 👽 A new technique, named "FuncIn", has been integrated to #UnprotectProject, showcasing a sophisticated evasion technique with a working open-source demo. In short, FuncIn employs a payload staging strategy, diverging from the conventional method where all malicious…

#100DaysOfYara Day 12: Making a rule for @dr4k0nia NixImports malware loader. Built for evasion without any user strings and dynamically resolving managed functions based on hashes. Also contributing to #UnprotectProject github.com/cod3nym/detect… Checkout the authors blog post…

cod3nym's tweet image. #100DaysOfYara Day 12: Making a rule for @dr4k0nia NixImports malware loader. Built for evasion without any user strings and dynamically resolving managed functions based on hashes. Also contributing to #UnprotectProject

github.com/cod3nym/detect…

Checkout the authors blog post…

#100DaysofYARA Day 4: Today we are detecting #ConfuserEx binaries without any watermarks. Messing a bit with hex strings and contributing to #UnprotectProject I wrote a blog post explaining the process behind the creation of this rule: cod3nym.github.io/Detecting-Stea… Find the Yara rule…

cod3nym's tweet image. #100DaysofYARA Day 4:
Today we are detecting #ConfuserEx binaries without any watermarks. Messing a bit with hex strings and contributing to #UnprotectProject

I wrote a blog post explaining the process behind the creation of this rule:
cod3nym.github.io/Detecting-Stea…

Find the Yara rule…
cod3nym's tweet image. #100DaysofYARA Day 4:
Today we are detecting #ConfuserEx binaries without any watermarks. Messing a bit with hex strings and contributing to #UnprotectProject

I wrote a blog post explaining the process behind the creation of this rule:
cod3nym.github.io/Detecting-Stea…

Find the Yara rule…

#100DaysofYara Day 9: Excited to get this one in. Today we will cover the rules for the latest #PureCrypter's initial and core payloads. PureCrypter is a .NET crypter/loader, which has been used by many RATs and stealers. It also means another contribution to #UnprotectProject ,…

RussianPanda9xx's tweet image. #100DaysofYara Day 9:
Excited to get this one in. Today we will cover the rules for the latest #PureCrypter's initial and core payloads. PureCrypter is a .NET crypter/loader, which has been used by many RATs and stealers.

It also means another contribution to #UnprotectProject ,…
RussianPanda9xx's tweet image. #100DaysofYara Day 9:
Excited to get this one in. Today we will cover the rules for the latest #PureCrypter's initial and core payloads. PureCrypter is a .NET crypter/loader, which has been used by many RATs and stealers.

It also means another contribution to #UnprotectProject ,…

#100DaysOfYara Day 9: Another day another .NET obfuscator #Yara rule. Today I am detecting .NET Reactor and their unique naming conventions. Also contributing to #UnprotectProject github.com/cod3nym/detect… All my obfuscator related rules available for malcat or any other Yara…

cod3nym's tweet image. #100DaysOfYara Day 9:
Another day another .NET obfuscator #Yara rule. Today I am detecting .NET Reactor and their unique naming conventions. Also contributing to #UnprotectProject

github.com/cod3nym/detect…

All my obfuscator related rules available for malcat or any other Yara…
cod3nym's tweet image. #100DaysOfYara Day 9:
Another day another .NET obfuscator #Yara rule. Today I am detecting .NET Reactor and their unique naming conventions. Also contributing to #UnprotectProject

github.com/cod3nym/detect…

All my obfuscator related rules available for malcat or any other Yara…

#100DaysOfYara Day 14: Another rule for a #UnprotectProject technique. This rule targets the Right-To-Left (RLO) extension spoofing technique.This spoofing also works on VT but only in the GUI, the URL shows the actual file %E2%80%AEfdp.exe E2 80 AE are the bytes encoding the…

cod3nym's tweet image. #100DaysOfYara Day 14:
Another rule for a #UnprotectProject technique. This rule targets the Right-To-Left (RLO) extension spoofing technique.This spoofing also works on VT but only in the GUI, the URL shows the actual file %E2%80%AEfdp.exe 

E2 80 AE are the bytes encoding the…
cod3nym's tweet image. #100DaysOfYara Day 14:
Another rule for a #UnprotectProject technique. This rule targets the Right-To-Left (RLO) extension spoofing technique.This spoofing also works on VT but only in the GUI, the URL shows the actual file %E2%80%AEfdp.exe 

E2 80 AE are the bytes encoding the…
cod3nym's tweet image. #100DaysOfYara Day 14:
Another rule for a #UnprotectProject technique. This rule targets the Right-To-Left (RLO) extension spoofing technique.This spoofing also works on VT but only in the GUI, the URL shows the actual file %E2%80%AEfdp.exe 

E2 80 AE are the bytes encoding the…

🤓During the #100DaysOfYara, if you are not sure how to contribute, you can always contribute to the #UnprotectProject! cc: @DarkCoderSc

fr0gger_'s tweet image. 🤓During the #100DaysOfYara, if you are not sure how to contribute, you can always contribute to the #UnprotectProject! cc: @DarkCoderSc

#100DaysOfYara Late Day 13: Wrote a Yara rule for EvasionUsingSyscall from #UnprotectProject Using a hex string to detect the emitted assembly instructions. From the POC code. github.com/cod3nym/detect… unprotect.it/technique/evas…

cod3nym's tweet image. #100DaysOfYara Late Day 13: 
Wrote a Yara rule for EvasionUsingSyscall from #UnprotectProject Using a hex string to detect the emitted assembly instructions. From the POC code.

github.com/cod3nym/detect…

unprotect.it/technique/evas…

#100DaysofYara Day 10: Was scrolling through #UnprotectProject for some Yara rule ideas... Today, I picked the rule that detects Base64 encoding in native binaries. Contributing the rule to #UnprotectProject, of course, cc @fr0gger_ 💜 github.com/RussianPanda95…

RussianPanda9xx's tweet image. #100DaysofYara Day 10:
Was scrolling through #UnprotectProject for some Yara rule ideas... 
Today, I picked the rule that detects Base64 encoding in native binaries. 

Contributing the rule to #UnprotectProject, of course, cc @fr0gger_  💜

github.com/RussianPanda95…

#100DaysOfYara Day 16: Today I wrote a rule for the PyArmor python obfuscator. A simple rule checking for common strings used by the obfuscators runtime. Also contributing this to #UnprotectProject github.com/cod3nym/detect…

cod3nym's tweet image. #100DaysOfYara Day 16: 
Today I wrote a rule for the PyArmor python obfuscator. A simple rule checking for common strings used by the obfuscators runtime. Also contributing this to #UnprotectProject

github.com/cod3nym/detect…

#100DaysofYara Day 7 + 8: Cheating a bit with the days. Today I target ConfuserEx again and and contribute to #UnprotectProject Detecting ConfuserEx compression packer github.com/cod3nym/detect… But I got a bonus for you: How I come up with these rules a mini write up below:

cod3nym's tweet image. #100DaysofYara Day 7 + 8:
Cheating a bit with the days. Today I target ConfuserEx again and and contribute to #UnprotectProject Detecting ConfuserEx compression packer

github.com/cod3nym/detect…

But I got a bonus for you: How I come up with these rules a mini write up below:
cod3nym's tweet image. #100DaysofYara Day 7 + 8:
Cheating a bit with the days. Today I target ConfuserEx again and and contribute to #UnprotectProject Detecting ConfuserEx compression packer

github.com/cod3nym/detect…

But I got a bonus for you: How I come up with these rules a mini write up below:

Just a little teaser ( non definitive UI and exhaustive features ) , coming very soon 😎 #UnprotectProject #Malware #InfoSec #DFIR cf: @fr0gger_

DarkCoderSc's tweet image. Just a little teaser ( non definitive UI and exhaustive features ) , coming very soon 😎 #UnprotectProject #Malware #InfoSec #DFIR cf: @fr0gger_

Love investigating malware? You can preorder and get early access to "Evasive Malware: Understanding Deceptive and Self-Defending Threats" - use coupon code "EVASIVE25" to get 25% off and send some ❤️ to the #UnprotectProject (@fr0gger_ /@DarkCoderSc) securityliterate.com/evasive-malwar…

d4rksystem's tweet image. Love investigating malware? You can preorder and get early access to "Evasive Malware: Understanding Deceptive and Self-Defending Threats" - use coupon code "EVASIVE25" to get 25% off and send some ❤️ to the #UnprotectProject (@fr0gger_ /@DarkCoderSc)

securityliterate.com/evasive-malwar…

📢Big news! We recently did a major update on the #UnprotectProject; we are now supporting evasion techniques on Windows, Linux, and macOS. Still a WIP but Pull Requests are welcome! 🤓 cc: @DarkCoderSc #malware #evasion

fr0gger_'s tweet image. 📢Big news! We recently did a major update on the #UnprotectProject; we are now supporting evasion techniques on Windows, Linux, and macOS.

Still a WIP but Pull Requests are welcome! 🤓 cc: @DarkCoderSc #malware #evasion

Huge thank you to @fr0gger_ and #UnprotectProject for the awesome swag, was a lot of fun to contribute to the project so far. If you're interested in detection rules and malware techniques make sure to check out unprotect.it

cod3nym's tweet image. Huge thank you to @fr0gger_ and #UnprotectProject for the awesome swag, was a lot of fun to contribute to the project so far. If you're interested in detection rules and malware techniques make sure to check out unprotect.it

⭐ New entry in the #UnprotectProject in Network Evasion with SMTP Exfiltration. Including code snippet and I also added a yara rule! Contribution by @tasdir_x cc: @DarkCoderSc #100daysofyara unprotect.it/technique/exfi…

fr0gger_'s tweet image. ⭐ New entry in the #UnprotectProject in Network Evasion with SMTP Exfiltration. Including code snippet and I also added a yara rule! Contribution by @tasdir_x cc: @DarkCoderSc  #100daysofyara  

unprotect.it/technique/exfi…

We have great candidates for the #UnprotectProject Linux edition @DarkCoderSc 🧐 Great writeup on the latest Ivanti zero-day 👇 cloud.google.com/blog/topics/th…

fr0gger_'s tweet image. We have great candidates for the #UnprotectProject Linux edition @DarkCoderSc  🧐

Great writeup on the latest Ivanti zero-day 👇

cloud.google.com/blog/topics/th…

Thank you so much for the Unprotect Ambassador Coin 🪙 and the badass sticker 👽 @fr0gger_ ❤️🥹 It is a great pleasure to contribute to your project at #UnprotectProject

RussianPanda9xx's tweet image. Thank you so much for the Unprotect Ambassador Coin 🪙 and the badass sticker 👽 @fr0gger_  ❤️🥹 It is a great pleasure to contribute to your project at #UnprotectProject

Check out this new entry in the #UnprotectProject by my friend @DarkCoderSc! 😎 *Indirect Memory Writing* for example an attacker calls standard Windows APIs that accept an output pointer. You can point that pointer at executable memory. The attacker can then build a payload…

Has anyone ever seen or used this evasion technique? I have been using it for many years and still find it effective (particularly with macro's), so I was surprised to see it continue to work so I decided to document it on Unprotect : unprotect.it/technique/indi… Feedback appreciated!



That's a good one, it could be added to the #unprotectProject unprotect.it


🤓 We have just added couple of Linux anti-forensic techniques to the #UnprotectProject, based on the latest campaign observed by Mandiant that exploit two vulnerabilities, CVE-2025-0282 and CVE-2025-0283, on Ivanti Connect Secure! cf: @DarkCoderSc 👇 unprotect.it/category/anti-…

fr0gger_'s tweet image. 🤓 We have just added couple of Linux anti-forensic techniques to the #UnprotectProject, based on the latest campaign observed by Mandiant that exploit two vulnerabilities, CVE-2025-0282 and CVE-2025-0283, on Ivanti Connect Secure! cf: @DarkCoderSc 👇

unprotect.it/category/anti-…

🧐 The abuse of the Apple XProtect encryption algo from the Banshee malware is very interesting, so I added it in #UnprotectProject! MacOS evasion techniques are still early in the project, but there are plenty of techniques to be added! @DarkCoderSc ➡️unprotect.it/technique/xpro…

fr0gger_'s tweet image. 🧐 The abuse of the Apple XProtect encryption algo from the Banshee malware is very interesting, so I added it in #UnprotectProject!

MacOS evasion techniques are still early in the project, but there are plenty of techniques to be added! @DarkCoderSc 

➡️unprotect.it/technique/xpro…

⭐ New entry in the #UnprotectProject in Network Evasion with SMTP Exfiltration. Including code snippet and I also added a yara rule! Contribution by @tasdir_x cc: @DarkCoderSc #100daysofyara unprotect.it/technique/exfi…

fr0gger_'s tweet image. ⭐ New entry in the #UnprotectProject in Network Evasion with SMTP Exfiltration. Including code snippet and I also added a yara rule! Contribution by @tasdir_x cc: @DarkCoderSc  #100daysofyara  

unprotect.it/technique/exfi…

We have great candidates for the #UnprotectProject Linux edition @DarkCoderSc 🧐 Great writeup on the latest Ivanti zero-day 👇 cloud.google.com/blog/topics/th…

fr0gger_'s tweet image. We have great candidates for the #UnprotectProject Linux edition @DarkCoderSc  🧐

Great writeup on the latest Ivanti zero-day 👇

cloud.google.com/blog/topics/th…

🤓During the #100DaysOfYara, if you are not sure how to contribute, you can always contribute to the #UnprotectProject! cc: @DarkCoderSc

fr0gger_'s tweet image. 🤓During the #100DaysOfYara, if you are not sure how to contribute, you can always contribute to the #UnprotectProject! cc: @DarkCoderSc

🎨 November: I presented at @BSidesGC, @HCKSYD and @BSidesMelbourne. We launched the #UnprotectProject Scanner with @DarkCoderSc and joined @CyberSecRicki for a career cybersecurity webinar. I also published a blog on building a GenAI CTI assistant. unprotect.it/scan/


You now have the option to keep the uploaded sample private to you in the #UnprotectProject cf: @darkcodersc #malware #infosec 👇 unprotect.it/scan/

fr0gger_'s tweet image. You now have the option to keep the uploaded sample private to you in the #UnprotectProject cf: @darkcodersc #malware #infosec 👇

unprotect.it/scan/

📢 We added more functionalities to the #UnprotectProject Scanner! 👽 You can now look for additional information as well as the PEID signature! Check this out! 👇 cc: @DarkCoderSc #malware unprotect.it/scan/

fr0gger_'s tweet image. 📢 We added more functionalities to the #UnprotectProject Scanner!

👽 You can now look for additional information as well as the PEID signature! 

Check this out! 👇 cc: @DarkCoderSc #malware 

unprotect.it/scan/

Just a little teaser ( non definitive UI and exhaustive features ) , coming very soon 😎 #UnprotectProject #Malware #InfoSec #DFIR cf: @fr0gger_

DarkCoderSc's tweet image. Just a little teaser ( non definitive UI and exhaustive features ) , coming very soon 😎 #UnprotectProject #Malware #InfoSec #DFIR cf: @fr0gger_

📢Big news! We recently did a major update on the #UnprotectProject; we are now supporting evasion techniques on Windows, Linux, and macOS. Still a WIP but Pull Requests are welcome! 🤓 cc: @DarkCoderSc #malware #evasion

fr0gger_'s tweet image. 📢Big news! We recently did a major update on the #UnprotectProject; we are now supporting evasion techniques on Windows, Linux, and macOS.

Still a WIP but Pull Requests are welcome! 🤓 cc: @DarkCoderSc #malware #evasion

Awesome blog, you know it is an entry for the #UnprotectProject 🤩🤩🤩


🤓 We recently added new entries to the #UnprotectProject! Here's a small thread on the latest additions 👇 cc: @darckcodersc #malware #evasion


Thanks @fr0gger_! If you order Evasive Malware from the #UnprotectProject website, you get 25% off and also support the project! 😎


Got a gift in the mail from @fr0gger_ and @DarkCoderSc! Thanks guys! Happy to support #UnprotectProject and keep up the great work - it’s an amazing project 😎


No results for "#unprotectproject"

#100DaysOfYara Day 15: Wrote a rule for notorious open source crypter malware LimeCrypter. Detecting the RunPE code based on hardcoded constants. Also contributing it to #UnprotectProject github.com/cod3nym/detect…

cod3nym's tweet image. #100DaysOfYara Day 15: 
Wrote a rule for notorious open source crypter malware LimeCrypter. Detecting the RunPE code based on hardcoded constants. Also contributing it to #UnprotectProject

github.com/cod3nym/detect…

#100DaysofYara Day 9: Excited to get this one in. Today we will cover the rules for the latest #PureCrypter's initial and core payloads. PureCrypter is a .NET crypter/loader, which has been used by many RATs and stealers. It also means another contribution to #UnprotectProject ,…

RussianPanda9xx's tweet image. #100DaysofYara Day 9:
Excited to get this one in. Today we will cover the rules for the latest #PureCrypter's initial and core payloads. PureCrypter is a .NET crypter/loader, which has been used by many RATs and stealers.

It also means another contribution to #UnprotectProject ,…
RussianPanda9xx's tweet image. #100DaysofYara Day 9:
Excited to get this one in. Today we will cover the rules for the latest #PureCrypter's initial and core payloads. PureCrypter is a .NET crypter/loader, which has been used by many RATs and stealers.

It also means another contribution to #UnprotectProject ,…

👽 A new technique, named "FuncIn", has been integrated to #UnprotectProject, showcasing a sophisticated evasion technique with a working open-source demo. In short, FuncIn employs a payload staging strategy, diverging from the conventional method where all malicious…

DarkCoderSc's tweet image. 👽 A new technique, named "FuncIn", has been integrated to #UnprotectProject, showcasing a sophisticated evasion technique with a working open-source demo. In short, FuncIn employs a payload staging strategy, diverging from the conventional method where all malicious…

Just a little teaser ( non definitive UI and exhaustive features ) , coming very soon 😎 #UnprotectProject #Malware #InfoSec #DFIR cf: @fr0gger_

DarkCoderSc's tweet image. Just a little teaser ( non definitive UI and exhaustive features ) , coming very soon 😎 #UnprotectProject #Malware #InfoSec #DFIR cf: @fr0gger_

Love investigating malware? You can preorder and get early access to "Evasive Malware: Understanding Deceptive and Self-Defending Threats" - use coupon code "EVASIVE25" to get 25% off and send some ❤️ to the #UnprotectProject (@fr0gger_ /@DarkCoderSc) securityliterate.com/evasive-malwar…

d4rksystem's tweet image. Love investigating malware? You can preorder and get early access to "Evasive Malware: Understanding Deceptive and Self-Defending Threats" - use coupon code "EVASIVE25" to get 25% off and send some ❤️ to the #UnprotectProject (@fr0gger_ /@DarkCoderSc)

securityliterate.com/evasive-malwar…

Something is coming very soon for our #UnprotectProject contributors... 😉🖤

fr0gger_'s tweet image. Something is coming very soon for our #UnprotectProject contributors... 😉🖤
fr0gger_'s tweet image. Something is coming very soon for our #UnprotectProject contributors... 😉🖤

I did a thing! I created my first GPT named "MagicUnprotect". This GPT is connected to the #UnprotectProject knowledgebase. You can ask anything related to evasion techniques! I'll share it when the test is done 🤓 #infosec #malware @DarkCoderSc

fr0gger_'s tweet image. I did a thing! I created my first GPT named "MagicUnprotect". This GPT is connected to the #UnprotectProject knowledgebase. You can ask anything related to evasion techniques! I'll share it when the test is done 🤓 #infosec #malware @DarkCoderSc
fr0gger_'s tweet image. I did a thing! I created my first GPT named "MagicUnprotect". This GPT is connected to the #UnprotectProject knowledgebase. You can ask anything related to evasion techniques! I'll share it when the test is done 🤓 #infosec #malware @DarkCoderSc
fr0gger_'s tweet image. I did a thing! I created my first GPT named "MagicUnprotect". This GPT is connected to the #UnprotectProject knowledgebase. You can ask anything related to evasion techniques! I'll share it when the test is done 🤓 #infosec #malware @DarkCoderSc

#100DaysofYARA Day 4: Today we are detecting #ConfuserEx binaries without any watermarks. Messing a bit with hex strings and contributing to #UnprotectProject I wrote a blog post explaining the process behind the creation of this rule: cod3nym.github.io/Detecting-Stea… Find the Yara rule…

cod3nym's tweet image. #100DaysofYARA Day 4:
Today we are detecting #ConfuserEx binaries without any watermarks. Messing a bit with hex strings and contributing to #UnprotectProject

I wrote a blog post explaining the process behind the creation of this rule:
cod3nym.github.io/Detecting-Stea…

Find the Yara rule…
cod3nym's tweet image. #100DaysofYARA Day 4:
Today we are detecting #ConfuserEx binaries without any watermarks. Messing a bit with hex strings and contributing to #UnprotectProject

I wrote a blog post explaining the process behind the creation of this rule:
cod3nym.github.io/Detecting-Stea…

Find the Yara rule…

#100DaysofYara Day 10: Was scrolling through #UnprotectProject for some Yara rule ideas... Today, I picked the rule that detects Base64 encoding in native binaries. Contributing the rule to #UnprotectProject, of course, cc @fr0gger_ 💜 github.com/RussianPanda95…

RussianPanda9xx's tweet image. #100DaysofYara Day 10:
Was scrolling through #UnprotectProject for some Yara rule ideas... 
Today, I picked the rule that detects Base64 encoding in native binaries. 

Contributing the rule to #UnprotectProject, of course, cc @fr0gger_  💜

github.com/RussianPanda95…

#100DaysOfYara Day 9: Another day another .NET obfuscator #Yara rule. Today I am detecting .NET Reactor and their unique naming conventions. Also contributing to #UnprotectProject github.com/cod3nym/detect… All my obfuscator related rules available for malcat or any other Yara…

cod3nym's tweet image. #100DaysOfYara Day 9:
Another day another .NET obfuscator #Yara rule. Today I am detecting .NET Reactor and their unique naming conventions. Also contributing to #UnprotectProject

github.com/cod3nym/detect…

All my obfuscator related rules available for malcat or any other Yara…
cod3nym's tweet image. #100DaysOfYara Day 9:
Another day another .NET obfuscator #Yara rule. Today I am detecting .NET Reactor and their unique naming conventions. Also contributing to #UnprotectProject

github.com/cod3nym/detect…

All my obfuscator related rules available for malcat or any other Yara…

#100DaysOfYara Day 12: Making a rule for @dr4k0nia NixImports malware loader. Built for evasion without any user strings and dynamically resolving managed functions based on hashes. Also contributing to #UnprotectProject github.com/cod3nym/detect… Checkout the authors blog post…

cod3nym's tweet image. #100DaysOfYara Day 12: Making a rule for @dr4k0nia NixImports malware loader. Built for evasion without any user strings and dynamically resolving managed functions based on hashes. Also contributing to #UnprotectProject

github.com/cod3nym/detect…

Checkout the authors blog post…

🤓During the #100DaysOfYara, if you are not sure how to contribute, you can always contribute to the #UnprotectProject! cc: @DarkCoderSc

fr0gger_'s tweet image. 🤓During the #100DaysOfYara, if you are not sure how to contribute, you can always contribute to the #UnprotectProject! cc: @DarkCoderSc

#100DaysOfYara Late Day 13: Wrote a Yara rule for EvasionUsingSyscall from #UnprotectProject Using a hex string to detect the emitted assembly instructions. From the POC code. github.com/cod3nym/detect… unprotect.it/technique/evas…

cod3nym's tweet image. #100DaysOfYara Late Day 13: 
Wrote a Yara rule for EvasionUsingSyscall from #UnprotectProject Using a hex string to detect the emitted assembly instructions. From the POC code.

github.com/cod3nym/detect…

unprotect.it/technique/evas…

🤩 New anti-sandboxing technique added by @HuntressLabs into the #UnprotectProject, it includes a code snippet, and I just added a loose yara rule 👇 cc: @HuskyHacksMK thanks for your contribution 🫶 unprotect.it/technique/buil… @DarkCoderSc #infosec #malware #evasion

fr0gger_'s tweet image. 🤩 New anti-sandboxing technique added by @HuntressLabs into the #UnprotectProject, it includes a code snippet, and I just added a loose yara rule 👇 cc: @HuskyHacksMK thanks for your contribution 🫶

unprotect.it/technique/buil… 

@DarkCoderSc #infosec  #malware #evasion

We have great candidates for the #UnprotectProject Linux edition @DarkCoderSc 🧐 Great writeup on the latest Ivanti zero-day 👇 cloud.google.com/blog/topics/th…

fr0gger_'s tweet image. We have great candidates for the #UnprotectProject Linux edition @DarkCoderSc  🧐

Great writeup on the latest Ivanti zero-day 👇

cloud.google.com/blog/topics/th…

New entry in the #UnprotectProject: "Process Argument Spoofing" by @__nuts7 including code snippet! Check this out! 👇 cf: @DarkCoderSc #infosec #evasion #malware unprotect.it/technique/proc…

fr0gger_'s tweet image. New entry in the #UnprotectProject: "Process Argument Spoofing" by @__nuts7 including code snippet! Check this out! 👇 cf: @DarkCoderSc #infosec #evasion #malware 

unprotect.it/technique/proc…

#100DaysOfYara Day 14: Another rule for a #UnprotectProject technique. This rule targets the Right-To-Left (RLO) extension spoofing technique.This spoofing also works on VT but only in the GUI, the URL shows the actual file %E2%80%AEfdp.exe E2 80 AE are the bytes encoding the…

cod3nym's tweet image. #100DaysOfYara Day 14:
Another rule for a #UnprotectProject technique. This rule targets the Right-To-Left (RLO) extension spoofing technique.This spoofing also works on VT but only in the GUI, the URL shows the actual file %E2%80%AEfdp.exe 

E2 80 AE are the bytes encoding the…
cod3nym's tweet image. #100DaysOfYara Day 14:
Another rule for a #UnprotectProject technique. This rule targets the Right-To-Left (RLO) extension spoofing technique.This spoofing also works on VT but only in the GUI, the URL shows the actual file %E2%80%AEfdp.exe 

E2 80 AE are the bytes encoding the…
cod3nym's tweet image. #100DaysOfYara Day 14:
Another rule for a #UnprotectProject technique. This rule targets the Right-To-Left (RLO) extension spoofing technique.This spoofing also works on VT but only in the GUI, the URL shows the actual file %E2%80%AEfdp.exe 

E2 80 AE are the bytes encoding the…

🎇It's almost New Year, and if you're looking for a fun challenge to kick off 2024, check out the #100DaysOfYara by @greglesnewich – it's a good one! And if you're not sure where to start, we're in need of Yara contributors for the #UnprotectProject! #infosec #malware #evasion

fr0gger_'s tweet image. 🎇It's almost New Year, and if you're looking for a fun challenge to kick off 2024, check out the #100DaysOfYara by @greglesnewich – it's a good one! And if you're not sure where to start, we're in need of Yara contributors for the #UnprotectProject! #infosec #malware #evasion…

⭐ New entry in the #UnprotectProject in Network Evasion with SMTP Exfiltration. Including code snippet and I also added a yara rule! Contribution by @tasdir_x cc: @DarkCoderSc #100daysofyara unprotect.it/technique/exfi…

fr0gger_'s tweet image. ⭐ New entry in the #UnprotectProject in Network Evasion with SMTP Exfiltration. Including code snippet and I also added a yara rule! Contribution by @tasdir_x cc: @DarkCoderSc  #100daysofyara  

unprotect.it/technique/exfi…

Loading...

Something went wrong.


Something went wrong.


United States Trends