#malwareanalysis search results
🔍 A DLL isn’t a standalone file — it has no main function like an EXE. That’s why we need tools like WinDbg + SOS to uncover where execution really begins. In this week’s drop, we show you how. youtu.be/MsijfXAu3rA?si… #ReverseEngineering #dotnet #MalwareAnalysis #HackDef #dll
Mustang Panda's latest campaign targets the Tibetan community, using DLL side-loading via phishing to deliver malware through a decoy file named 'Voice for the Voiceless Photos.exe', as analyzed in a detailed report. #CyberSecurity #MalwareAnalysis 0x0d4y.blog/mustang-panda-…
0x0d4y.blog
Mustang Panda Employ Publoader Through ClaimLoader: Yes.. another DLL Side-Loading Technique...
In this new post I will analyze, once again, an execution chain of payloads delivered via Phishing from another Threat Actor China-Nexus, however, implementing the same TTP, yes, DLL Side-Loading! In...
🌱🕵️♀️ Every great hacker story starts with curiosity — the urge to ask “how does this work?” Join @_sudhackar at #NullconGoa2026 to advance that spark into a skill, learning through the complexities of #reverseengineering and #malwareanalysis. Know More: nullcon.net/goa-2026/train…

XWorm V6.0 returned in 2025 with modular plugins for remote access, credential theft, ransomware, and persistence using ResetConfig.xml. Linked to NoCry and distributed via cracked builders. C2: 94.159.113.64:4411. #MalwareAnalysis #XWorm #Russia ift.tt/ejJTWUA
In this advanced learning track, you’ll discover how analysts use sandboxed environments to observe malware behavior — without spreading it. #Menagos #MalwareAnalysis #Cybersecurity #EthicalHacking
🔍 Web Malware Scan Results Website: cooldl.net Security Verdict: LOW RISK Full analysis & details: scanmalware.com/scan/6e139e09-… #ISO27001 #MalwareAnalysis #Phishing #ThreatDetection #IncidentResponse
scanmalware.com
Security Scan: ناصر تقوایی
⚡ Medium Risk - https://cooldl.net/tag/%D9%86%D8%A7%D8%B5%D8%B1-%D8%AA%D9%82%D9%88%D8%A7%DB%8C%DB%8C
I’m documenting my reverse engineering journey, follow along as I share tools, labs, and breakdowns. #CyberSecurity #DFIR #MalwareAnalysis #Hacking
Learn how analysts use sandbox labs to test malicious files — without any risk! #MalwareAnalysis #Cybersecurity #EthicalHacking #InfoSec #CyberAwareness

Gotta love the irony.... naming your malware Bella Ciao while getting caught by your own debug strings is peak “anti-fascist, pro-forensics” energy. Guess even the payload decided to sing goodbye, beautiful to OPSEC. #MalwareAnalysis #ThreatIntel
🔍 Web Malware Scan Results Website: comune.cerignola.fg.it Security Verdict: LOW RISK Full analysis & details: scanmalware.com/scan/6a3f0095-… #PurpleTeam #OnlineSafety #MalwareAnalysis #CyberThreat
🔍 Web Malware Scan Results Website: comune.valperga.to.it Security Verdict: LOW RISK Full analysis & details: scanmalware.com/scan/eb4fa7e0-… #SOCAnalyst #MalwareAnalysis #ThreatDetection
(Reverse Engineering): 👇 m.youtube.com/@Stodachon #MalwareAnalysis #ReverseEngineering #Obfuscation #RedTeam #OffSec #Cybersecurity
By running samples in a safe sandbox, we can: 🔍 Observe system changes 📡 Monitor network activity ⚙️ Detect persistence techniques It’s like watching the attacker’s playbook unfold in real time. #CyberSecurity #SOC #MalwareAnalysis #InfoSec #BlueTeam
🔍 Web Malware Scan Results Website: bacinovrsud.it Security Verdict: LOW RISK Full analysis & details: scanmalware.com/scan/91fe7320-… #GenerativeAI #MalwareAnalysis #AppSec #Malware
🚨 Warning! PureRAT is evolving. Discover how this threat transforms from a simple infostealer into a full-blown Remote Access Trojan 🚨 in this essential analysis. Stay informed, stay secure! #Cybersecurity #MalwareAnalysis ⤵️
🚨 UTA0388's espionage malware evolved from HealthKick to the dangerous GOVERSHELL! Uncover the full evolution of this persistent threat. #CyberSecurity #MalwareAnalysis ⤵️
🔬 New video: Android Hacking 888 RAT 1.2.6 Watch: youtube.com/watch?v=qjRuu4… #MobileSecurity #MalwareAnalysis #ThreatHunting #888 #888RAT #RAT #androidhacking #hacking #mobilehacking

Have a question about your binaries? e.g., is this malware? are there any vulnerabilities, etc.🧩@ me with a downloadable link and your questions — I’ll run a full analysis for you. AI-powered reverse engineering, live 24x7. 📷 #MalwareAnalysis #ReverseEngineering #CyberSec…
🔍 Web Malware Scan Results Website: comune.gaiola.cn.it Security Verdict: LOW RISK Full analysis & details: scanmalware.com/scan/ec590032-… #MalwareAnalysis #SOC #DigitalSecurity
🔍 Web Malware Scan Results Website: normalil.gov Security Verdict: LOW RISK Full analysis & details: scanmalware.com/scan/f0dd83ba-… #DevSecOps #CyberDefense #MalwareAnalysis
🌱🕵️♀️ Every great hacker story starts with curiosity — the urge to ask “how does this work?” Join @_sudhackar at #NullconGoa2026 to advance that spark into a skill, learning through the complexities of #reverseengineering and #malwareanalysis. Know More: nullcon.net/goa-2026/train…

🌱🕵️♀️ Every great hacker story starts with curiosity — the urge to ask “how does this work?” Join @_sudhackar at #NullconGoa2026 to advance that spark into a skill, learning through the complexities of #reverseengineering and #malwareanalysis. Know More: nullcon.net/goa-2026/train…

Something went wrong.
Something went wrong.
United States Trends
- 1. D’Angelo 248K posts
- 2. Brown Sugar 18.8K posts
- 3. Drew Struzan 23K posts
- 4. #PortfolioDay 13.1K posts
- 5. Black Messiah 9,422 posts
- 6. Pentagon 102K posts
- 7. Young Republicans 8,588 posts
- 8. Voodoo 19.2K posts
- 9. Politico 142K posts
- 10. How Does It Feel 8,203 posts
- 11. Powell 41.3K posts
- 12. Happy Birthday Charlie 136K posts
- 13. VPNs 1,253 posts
- 14. Baldwin 19K posts
- 15. First Presidency 1,964 posts
- 16. Scream 5 N/A
- 17. Soybeans 2,987 posts
- 18. World Cup 298K posts
- 19. Venables 3,029 posts
- 20. CJGJ N/A