North Korean hackers use phoney Coinbase job offers to target cryptocurrency professionals. The renowned North Korean hacking outfit Lazarus has …
Purple Fox Rootkit Discovered In Malicious Telegram Installers
After steady research, it has been discovered that there are fake Telegram installers online with malicious intent. By distributing a …
FalconEye – Real-time detection software for Windows process injections
FalconEye is a windows endpoint detection software for real-time process injections. It is a kernel-mode driver that aims to catch …
Neurax – A Framework For Constructing Self-Spreading Binaries
A framework that aids in creation of self-spreading software Requirements go get -u github.com/redcode-labs/Coldfire go get -u github.com/yelinaung/go-haikunator New in …
What to do after a Ransomware Attack?
What do you do when you wake up one morning and realise that your log in credentials into your system …
Tscopy – Tool to parse the NTFS $MFT file to locate and copy specific files
Introducing TScopy It is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on …
Retoolkit – Reverse Engineer’s Toolkit
This is a collection of tools you may like if you are interested on reverse engineering and/or malware analysis on …
BaphoDashBoard – Dashboard For Manage And Generate The Baphomet Ransomware
With this proyect we will be able to handle the data of the victims we obtain with Baphomet Ransomware. BaphoDashBoard …
SysWhispers2 – AV/EDR Evasion Via Direct System Calls
SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are …
Go_Parser – Yet Another Golang Binary Parser For IDAPro
Yet Another Golang Binary Parser For IDAPro NOTE: This master branch is written in Python2 for IDAPython, and tested only …