Invoke-AntiVM is a set of modules to perform VM detection and fingerprinting (with exfiltration) via Powershell. Compatibility Run the script …
The malware that usually installs ransomware and you need to remove right away
Image: Lina White Gone are the days when ransomware groups operated by launching mass email spam campaigns in the hopes …
Doctrack – Tool To Manipulate And Insert Tracking Pixels Into Office Open XML Documents (Word, Excel)
Tool to manipulate and insert tracking pixels into Office Open XML documents. Features Insert tracking pixels into Office Open XML …
New Grelos skimmer variant reveals overlap in Magecart group activities, malware infrastructure
A new variant of a skimmer has revealed the increasingly muddy waters associated with tracking groups involved in Magecart-style attacks. …
Teler – Real-time HTTP Intrusion Detection
teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources …
Chaes malware strikes customers of Latin America’s largest e-commerce platform
Previously unknown malware has been detected in widespread attacks against e-commerce customers in Latin America. The malware, dubbed Chaes by …
Rehex – Reverse Engineers’ Hex Editor
A cross-platform (Windows, Linux, Mac) hex editor for reverse engineering, and everything else. Features Large (1TB+) file support Decoding of …
More than 200 systems infected by new Chinese APT ‘FunnyDream’
Getty Images/iStockphoto A new Chinese state-sponsored hacking group (also known as an APT) has infected more than 200 systems across Southeast …
MacC2 – Mac Command And Control That Uses Internal API Calls Instead Of Command Line Utilities
MacC2 is a macOS post exploitation tool written in python that uses Objective C calls or python libraries as opposed …
Go_Parser – Yet Another Golang Binary Parser For IDAPro
Yet Another Golang Binary Parser For IDAPro NOTE: This master branch is written in Python2 for IDAPython, and tested only …