#malwareresearch search results
“Mommy what happens to the animals that the vet can’t save?” “Well dear….” #hackersoutdoors #blackhoodies #malwareresearch
K7 Academy’s Technical Trainer, Sathiyan s, will conduct a programme on Modern Cybersecurity Malware Research in a session organised by Riyadh Elm University to introduce their students to modern #cybersecurity and research opportunities in the industry. #malwareresearch
Extractos de mis prácticas de laboratorio, desde algunos CTF hasta el análisis de muestras de Malware reales :D #MalwareResearch #MalwareAnalyst #BlueTeam #Malware #CTF #Ciberseguridad #CyberSecurity
#MalwareResearch #Reversing #4n6 @volatility volatility3-2.11.0 new version tool released. New #Linux and #Windows Plugins.
.@volatility New Release: #volatility3 v2.11.0 - visit github.com/volatilityfoun… for details and downloads. #memoryforensics #dfir
Bypassing Windows UAC can exploit security vulnerabilities, enabling unauthorized program execution with elevated privileges. UACMe shows how this process works. #Windows #UAC #MalwareResearch link: ift.tt/uVLZXoF
PPEE (puppy) v1.13 A free, professional PE file explorer for reversers, malware researchers and those who want to statically inspect PE files in more details. oldergeeks.com/downloads/file… #infosec #MalwareResearch
VX-API - Collection Of Various Malicious Functionality To Aid In Malware Development #MalwareDevelopment #MalwareResearch #VXAPI dlvr.it/Stj3Hl
Strela Stealer represents a significant threat to email account security by targeting credentials from widely used clients such as Microsoft Outlook and Mozilla Thunderbird. eu1.hubs.ly/H0fm9vh0 #Stealer #MalwareResearch #Brandefense
Ai-Malware: The Future Virus Writers It is possible that virus writers may use programming languages that are more suited to machine learning and AI, such as Python, TensorFlow, and Keras. #malware #malwareresearch #infosec #hacking
AI-Malware: the future of virus writing One of the most significant ways in which AI could impact the future of virus writing is through the use of machine learning algorithms. #hacking #malware #malwareresearch #infosec
AI-Driven Malware that Mimics Human Behaviour: AI-powered malware could be designed to mimic human behavior, making it more difficult for security teams to differentiate between legitimate user activity and malicious behavior. #malware #malwareresearch #infosec #hacking
AI-Powered Fileless Malware: Such malware could be designed to run entirely in memory and use machine learning algorithms to evade detection. #malware #malwareresearch #hacking #infosec
AI-Enabled Social Engineering Attacks: Using machine learning algorithms to analyze data from social media profiles and other sources to create convincing phishing emails, scam messages, or even voice phishing attacks. #malware #malwareresearch #infosec #hacking
SentinelLABS reveals that LLM-enabled malware presents new detection challenges, highlighting innovative strategies for hunting this emerging threat in their latest research. #CyberSecurity #MalwareResearch sentinelone.com/labs/prompts-a…
binary analysis, this is a good starter walkthrough. Watch here: youtu.be/GuCeOHp4-HE?si… Which side do you prefer: static or dynamic? #ReverseEngineering #MalwareResearch #Cybersecurity #Infosec #RedTeam #Kali #Linux
youtube.com
YouTube
Static vs Dynamic Analysis — Practical Demo (GDB + strace + Wiresha...
A more detailed technical deep research is coming soon. #CyberSecurity #ThreatIntel #MalwareResearch #KernelSecurity #SignedDrivers #WHCP #DriverAbuse #WindowsSecurity #signed
🔬 Just earned @TryHackMe’s Malware Analysis badge! ✅ Advanced dynamic analysis ✅ API tracing & memory forensics ✅ Anti-debugging detection Ready to turn these skills into sharper detections. #MalwareResearch #SOC tryhackme.com/r/trazee/badge… #tryhackme via @RealTryHackMe
Bypassing Windows UAC can exploit security vulnerabilities, enabling unauthorized program execution with elevated privileges. UACMe shows how this process works. #Windows #UAC #MalwareResearch link: ift.tt/uVLZXoF
github.com/JimKw1kX/AES-L… #malware #Hacking #MalwareResearch #MalwareDevelopment #ShellcodeLoader #PentestTool #RedTeam #PurpleTeam #ProcessInjection
github.com
GitHub - JimKw1kX/AES-Lsass-dump-via-duplicated-handle: Lsass dump duplicated handle with AES...
Lsass dump duplicated handle with AES Encryption. Contribute to JimKw1kX/AES-Lsass-dump-via-duplicated-handle development by creating an account on GitHub.
🔍 #DeepSeek's R1 model can create basic malware with some tweaks. Is this a boon or bane for cyber enthusiasts? #CyberSecurity #MalwareResearch go.theregister.com/feed/www.there…
theregister.com
DeepSeek spits out malware code with a little persuasion
: It might need polishing, but a useful find for any budding cybercrooks out there
#MalwareResearch #Reversing #4n6 @volatility volatility3-2.11.0 new version tool released. New #Linux and #Windows Plugins.
.@volatility New Release: #volatility3 v2.11.0 - visit github.com/volatilityfoun… for details and downloads. #memoryforensics #dfir
"Silent Push uncovers FIN7 using new AI DeepNude Generator malware on 7 websites. Malware includes 'free download' and 'free trial' honeypots. Threat group also employs NetSupport RAT malvertising campaign. #CyberSecurity #MalwareResearch" ift.tt/rn8gsPk
Extractos de mis prácticas de laboratorio, desde algunos CTF hasta el análisis de muestras de Malware reales :D #MalwareResearch #MalwareAnalyst #BlueTeam #Malware #CTF #Ciberseguridad #CyberSecurity
K7 Academy’s Technical Trainer, Sathiyan s, will conduct a programme on Modern Cybersecurity Malware Research in a session organised by Riyadh Elm University to introduce their students to modern #cybersecurity and research opportunities in the industry. #malwareresearch
“Mommy what happens to the animals that the vet can’t save?” “Well dear….” #hackersoutdoors #blackhoodies #malwareresearch
ThreatIngestor - Extract And Aggregate Threat Intelligence j.mp/2oKkqna #FraudDetection #IntelligenceGathering #MalwareResearch
#MalwareResearch #Reversing #4n6 @volatility volatility3-2.11.0 new version tool released. New #Linux and #Windows Plugins.
.@volatility New Release: #volatility3 v2.11.0 - visit github.com/volatilityfoun… for details and downloads. #memoryforensics #dfir
#Malware #TrainingSets: FollowUP - bit.ly/30oSbZj-Ttx @Marco_Ramilli ➡️ #MalwareResearch #AI #MachineLearning #MongoDB #ThreatIntelligence #MalwareAnalysis #HoneyPots #CyberAttacks #MalwareHunting #DeepLearning #CyberRisks #InfoSec #CyberSecurity #WEKA
K7 Academy’s Technical Trainer, Sathiyan s, will conduct a programme on Modern Cybersecurity Malware Research in a session organised by Riyadh Elm University to introduce their students to modern #cybersecurity and research opportunities in the industry. #malwareresearch
Extractos de mis prácticas de laboratorio, desde algunos CTF hasta el análisis de muestras de Malware reales :D #MalwareResearch #MalwareAnalyst #BlueTeam #Malware #CTF #Ciberseguridad #CyberSecurity
Join Katie Nickels (@likethecoins) and Runa Sandvik (@runasand) for a discussion on Runa's OS X malware research and investigation into targeting of journalists and other high-risk individuals. Set a reminder: youtu.be/Doj5HkoDEp0 #malware #malwareresearch
VX-API - Collection Of Various Malicious Functionality To Aid In Malware Development #MalwareDevelopment #MalwareResearch #VXAPI dlvr.it/Stj3Hl
Another C2 with juicy files (script, password list etc.) IoC: http: // 194.38.23.170/ Endpoints: /jira /pas /px /ro /scan @malwrhunterteam #c2server #maliciousdomain #malwareresearch #ThreatHunting
🚨TODAY! 🚨 Don't miss this discussion with Katie Nickels (@likethecoins) and Runa Sandvik (@runasand) on Runa's OS X malware research and investigation into targeting of journalists and other high-risk individuals. youtu.be/Doj5HkoDEp0 #malware #malwareresearch
Don't miss tomorrow's discussion with Katie Nickels (@likethecoins) and Runa Sandvik (@runasand) on Runa's OS X malware research and investigation into targeting of journalists and other high-risk individuals. Set a reminder: youtu.be/Doj5HkoDEp0 #malware #malwareresearch
⚠️ONE HOUR TO GO! ⚠️ Katie Nickels (@likethecoins) and Runa Sandvik (@runasand) will discuss Runa's OS X malware research and investigation into targeting of journalists and other high-risk individuals. Set a reminder:youtu.be/Doj5HkoDEp0 #malware #malwareresearch
RegistryChangesView v1.25 64bit- Compare snapshots of Windows registry. oldergeeks.com/downloads/file… #infosec #malwareresearch
"RT ThreatIngestor - Extract And Aggregate Threat Intelligence j.mp/2oKkqna #FraudDetection #IntelligenceGathering #MalwareResearch https://t.co/UmbNrObXvw"
FileActivityWatch v1.55 64bit- Shows info of read/write/delete operation of files. buff.ly/2rBsvbG #infosec #malwareresearch
RegistryChangesView v1.25 64bit- Compare snapshots of Windows registry. buff.ly/2Qe1p99 #infosec #malwareresearch
DRAKVUF Sandbox - Automated Hypervisor-Level Malware Analysis System dlvr.it/SKmBXR #DrakvufSandbox #MalwareResearch #ReverseEngineering #Windows
Bypassing Windows UAC can exploit security vulnerabilities, enabling unauthorized program execution with elevated privileges. UACMe shows how this process works. #Windows #UAC #MalwareResearch link: ift.tt/uVLZXoF
Something went wrong.
Something went wrong.
United States Trends
- 1. #LingOrm1st_ImpactFANCON 815K posts
- 2. Talus Labs 25.5K posts
- 3. #KirbyAirRiders 1,998 posts
- 4. Frankenstein 84.5K posts
- 5. Giulia 16K posts
- 6. taylor york 9,323 posts
- 7. #SmackDown 49.3K posts
- 8. #River 5,014 posts
- 9. Ketanji Brown Jackson 4,949 posts
- 10. Tulane 4,526 posts
- 11. Justice Jackson 6,321 posts
- 12. Pluribus 31.8K posts
- 13. Aaron Gordon 5,539 posts
- 14. Russ 14.6K posts
- 15. Tatis 2,294 posts
- 16. Guillermo del Toro 26.6K posts
- 17. Connor Bedard 3,305 posts
- 18. #TheFutureIsTeal N/A
- 19. Collar 17.3K posts
- 20. The Supreme Court 150K posts