home.social

#malwareanalysis โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #malwareanalysis, aggregated by home.social.

  1. We're excited to announce that the Call for Trainers is now OPEN for DEF CON Training Middle East!

    Are you passionate about cybersecurity, hacking, and hands-on learning? Do you have expertise in emerging threats, defensive strategies, or cutting-edge security techniques? We want to hear from you!

    Visit training.defcon.org to submit your trainer application for a two-day or three-day course by May 9, 2026.
    training.defcon.org/pages/2026

    #DEFCON #DEFCONTraining #Cybersecurity #Training #Hacking #InfoSec #SecurityCommunity #DEFCONMiddleEast #AI #RedTeam #BlueTeam #DigitalForensics #CyberTalent #MalwareAnalysis

  2. CW: Full toolkit (3 samples + scripts + YARA):(no download needed)

    archive.org/details/500ms-supp

    The name references Andres Freund's 500ms SSH delay that uncovered the
    XZ backdoor.

    The core finding: JsonSchema.Net.dll shipped in Microsoft's
    DesktopAppInstaller has a SHA256 that doesn't match any official NuGet
    release. It has a PE timestamp of year 2095. And it's signed by
    Microsoft's HSM.

    You can verify this on your own Windows 11 machine without downloading
    anything from me:

    Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\ConfigurationRemotingServer\JsonSchema.Net.dll"

    Compare with NuGet official: nuget.org/packages/JsonSchema.

    The toolkit also includes anomalies in Google's cloudcode_cli (104K
    internal refs) and Intel's IGCCTray (GCP data exfil in a graphics driver).

    ๐Ÿ” 500ms โ€” Supply chain anomalies in Windows 11 default binaries

    JsonSchema.Net.dll in Microsoft DesktopAppInstaller:
    โ†’ Hash โ‰  any official NuGet release
    โ†’ PE timestamp: year 2095
    โ†’ Signed by Microsoft HSM post-modification

    Verify on YOUR OWN Windows 11 (no download needed):
    Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\...\JsonSchema.Net.dll"
    Compare: nuget.org/packages/JsonSchema.Net/7.2.3

    #infosec #supplychainattack #malwareanalysis #microsoft #cybersecurity #threatintel #windows11 #forensics

  3. Tried to book a bar. Ended up reverse engineering a malware campaign instead.

    A fake "Cloudflare verify" page copied an obfuscated PowerShell loader to my clipboard. So I broke it down:

    XOR-obfuscated script
    Payload delivery
    RedCap infostealer analysis
    REMnux, Ghidra & Hybrid Analysis

    Also watched the infrastructure get taken down mid-write-up.

    First time doing any RE

    blog.michaelrbparker.com/post/

    (Still haven't booked that drink.)

    #CyberSecurity #MalwareAnalysis #ThreatAnalysis

  4. ๐Ÿš€ Just released smali-lsp!

    A Language Server for Smali with:
    โ€ข Goto definition
    โ€ข Cross-references
    โ€ข Symbols & hover
    โ€ข Works with any IDE (minimal setup)

    Also includes an MCP server โ†’ plug into AI agents for faster APK analysis ๐Ÿค–

    ๐Ÿ”— github.com/Surendrajat/smali-l

  5. ๐Ÿš€ Just released smali-lsp!

    A Language Server for Smali with:
    โ€ข Goto definition
    โ€ข Cross-references
    โ€ข Symbols & hover
    โ€ข Works with any IDE (minimal setup)

    Also includes an MCP server โ†’ plug into AI agents for faster APK analysis ๐Ÿค–

    ๐Ÿ”— github.com/Surendrajat/smali-l

    #AndroidDev #ReverseEngineering #MalwareAnalysis #LSP #InfoSec #RE #security #dalvik

  6. ๐Ÿš€ Just released smali-lsp!

    A Language Server for Smali with:
    โ€ข Goto definition
    โ€ข Cross-references
    โ€ข Symbols & hover
    โ€ข Works with any IDE (minimal setup)

    Also includes an MCP server โ†’ plug into AI agents for faster APK analysis ๐Ÿค–

    ๐Ÿ”— github.com/Surendrajat/smali-l

    #AndroidDev #ReverseEngineering #MalwareAnalysis #LSP #InfoSec #RE #security #dalvik

  7. #ReverseEngineering mit #KI? @martin_fmi erklรคrt, wie #LLMs Malware-Muster erkennen, externe Systemaufrufe rekonstruieren & versteckte Architekturen sichtbar machen. Selbst bei obfuskiertem Code.

    Lesen & auf den Ernstfall vorbereiten: javapro.io/de/ki-gesteuertes-r

    #MalwareAnalysis

  8. APT37โ€™s Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.

    Observed tradecraft includes:
    โ€ข LNK-based initial execution
    โ€ข Embedded PowerShell payload extraction
    โ€ข Ruby interpreter abuse (v3.3.0)
    โ€ข Scheduled task persistence (5-minute interval)
    โ€ข USB-based covert bidirectional C2
    โ€ข Multi-stage backdoor deployment
    Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.

    The removable media relay model enables:
    โ€“ Command staging offline
    โ€“ Data exfiltration without internet access
    โ€“ Lateral spread across isolated systems
    โ€“ Surveillance via Windows spyware
    This reinforces a critical point:
    Air-gap controls must extend beyond physical disconnection โ€” including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.

    Are critical infrastructure operators prepared for USB-mediated C2 relays?

    Source: bleepingcomputer.com/news/secu

    Engage below.

    Follow TechNadu for high-signal threat intelligence insights.
    Repost to elevate awareness.

    #Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture

  9. RE: infosec.exchange/@washi/116109

    MY MORTAL ENEMY IS THAT ONE zgRAT YARA RULE IT SHOWS UP FREAKING EVERYWHERE AND IS SO WRONG ASDHFJDSHFHASFHSDJAH

    thank you for this Washi! I learned some things about .NET from this post as well!

    popping on the #ReverseEngineering #MalwareAnalysis tags too

  10. REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโ€™analisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux

    linuxeasy.org/remnux-8-la-nuov

  11. ๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ (5/12): "Deconstructing Rust Binaries" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Cindy Xiao

    ๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
    ๐Ÿ“Š Difficulty: Medium
    ๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

    Description:
    "๐˜™๐˜ถ๐˜ด๐˜ต-๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ช๐˜ด ๐˜ข ๐˜จ๐˜ณ๐˜ฐ๐˜ธ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฉ๐˜ณ๐˜ฆ๐˜ข๐˜ต. ๐˜‹๐˜ฆ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜‰๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ฆ๐˜ฒ๐˜ถ๐˜ช๐˜ฑ๐˜ด ๐˜ณ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ฆ ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ด๐˜ต๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฆ๐˜ด๐˜ด๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ข๐˜ญ ๐˜ด๐˜ฌ๐˜ช๐˜ญ๐˜ญ๐˜ด ๐˜ง๐˜ฐ๐˜ณ ๐˜ต๐˜ข๐˜ค๐˜ฌ๐˜ญ๐˜ช๐˜ฏ๐˜จ ๐˜ข ๐˜ฏ๐˜ฆ๐˜ธ ๐˜ค๐˜ฉ๐˜ข๐˜ญ๐˜ญ๐˜ฆ๐˜ฏ๐˜จ๐˜ฆ. ๐˜‹๐˜บ๐˜ฏ๐˜ข๐˜ฎ๐˜ช๐˜ค ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ข๐˜ณ๐˜ฆ ๐˜ช๐˜ฏ๐˜ค๐˜ณ๐˜ฆ๐˜ข๐˜ด๐˜ช๐˜ฏ๐˜จ๐˜ญ๐˜บ ๐˜ฎ๐˜ฐ๐˜ท๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฐ๐˜ธ๐˜ข๐˜ณ๐˜ฅ๐˜ด ๐˜™๐˜ถ๐˜ด๐˜ต, ๐˜บ๐˜ฆ๐˜ต ๐˜ณ๐˜ฆ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ฆ ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ด ๐˜ญ๐˜ข๐˜ค๐˜ฌ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ด๐˜ฑ๐˜ฆ๐˜ค๐˜ช๐˜ข๐˜ญ๐˜ช๐˜ป๐˜ฆ๐˜ฅ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ญ๐˜ฆ๐˜ฅ๐˜จ๐˜ฆ ๐˜ต๐˜ฐ ๐˜ฅ๐˜ฆ๐˜ค๐˜ฐ๐˜ฅ๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฎ. ๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜ง๐˜ช๐˜ณ๐˜ด๐˜ต-๐˜ฐ๐˜ง-๐˜ช๐˜ต๐˜ด-๐˜ฌ๐˜ช๐˜ฏ๐˜ฅ ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ฃ๐˜ณ๐˜ช๐˜ฅ๐˜จ๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ค๐˜ณ๐˜ช๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜จ๐˜ข๐˜ฑ. ๐˜›๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ข ๐˜ญ๐˜ข๐˜ฏ๐˜จ๐˜ถ๐˜ข๐˜จ๐˜ฆ-๐˜ค๐˜ฆ๐˜ฏ๐˜ต๐˜ณ๐˜ช๐˜ค ๐˜ข๐˜ฑ๐˜ฑ๐˜ณ๐˜ฐ๐˜ข๐˜ค๐˜ฉ, ๐˜บ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ญ๐˜ฆ๐˜ข๐˜ณ๐˜ฏ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ง๐˜ถ๐˜ฏ๐˜ฅ๐˜ข๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ข๐˜ญ๐˜ด, ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ด ๐˜ต๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ญ๐˜ข๐˜ต๐˜ฆ ๐˜ต๐˜ฐ ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ฎ๐˜ฃ๐˜ญ๐˜บ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฎ๐˜ข๐˜ด๐˜ต๐˜ฆ๐˜ณ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ต๐˜ณ๐˜ช๐˜ข๐˜จ๐˜ฆ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด. ๐˜ ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ต๐˜ณ๐˜ข๐˜ค๐˜ฆ ๐˜ฅ๐˜ข๐˜ต๐˜ข ๐˜ง๐˜ญ๐˜ฐ๐˜ธ๐˜ด, ๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ง๐˜บ ๐˜ง๐˜ถ๐˜ฏ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ข๐˜ญ๐˜ช๐˜ต๐˜บ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ค๐˜ฐ๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต ๐˜ณ๐˜ฆ๐˜ข๐˜ญ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ฎ๐˜ข๐˜ญ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ด๐˜ข๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ๐˜ด ๐˜ช๐˜ฏ ๐˜ข ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ถ๐˜ณ๐˜ฆ๐˜ฅ, ๐˜ฆ๐˜ง๐˜ง๐˜ช๐˜ค๐˜ช๐˜ฆ๐˜ฏ๐˜ต ๐˜ธ๐˜ข๐˜บ. ๐˜ž๐˜ฉ๐˜ฆ๐˜ต๐˜ฉ๐˜ฆ๐˜ณ ๐˜บ๐˜ฐ๐˜ถ'๐˜ณ๐˜ฆ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ป๐˜ช๐˜ฏ๐˜จ ๐˜ณ๐˜ข๐˜ฏ๐˜ด๐˜ฐ๐˜ฎ๐˜ธ๐˜ข๐˜ณ๐˜ฆ ๐˜ฐ๐˜ณ ๐˜ข๐˜ฏ๐˜ข๐˜ญ๐˜บ๐˜ป๐˜ช๐˜ฏ๐˜จ ๐˜ญ๐˜ฆ๐˜จ๐˜ช๐˜ต๐˜ช๐˜ฎ๐˜ข๐˜ต๐˜ฆ ๐˜™๐˜ถ๐˜ด๐˜ต-๐˜ฃ๐˜ข๐˜ด๐˜ฆ๐˜ฅ ๐˜ด๐˜บ๐˜ด๐˜ต๐˜ฆ๐˜ฎ๐˜ด, ๐˜บ๐˜ฐ๐˜ถ'๐˜ญ๐˜ญ ๐˜ฅ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ต๐˜ณ๐˜ข๐˜ฅ๐˜ฆ๐˜ค๐˜ณ๐˜ข๐˜ง๐˜ต ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฒ๐˜ถ๐˜ช๐˜ค๐˜ฌ๐˜ญ๐˜บ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฃ๐˜ณ๐˜ฆ๐˜ข๐˜ฌ ๐˜ฅ๐˜ฐ๐˜ธ๐˜ฏ ๐˜™๐˜ถ๐˜ด๐˜ต ๐˜ฃ๐˜ช๐˜ฏ๐˜ข๐˜ณ๐˜ช๐˜ฆ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ."

    About the trainer:
    Cindy Xiao is an experienced malware reverse engineer with specialized expertise in analyzing Rust binaries. She brings real-world knowledge of emerging Rust-based threats and combines technical depth with practical, hands-on instruction to help security professionals rapidly upskill in this critical domain.

    ๐Ÿ”— Training details: nsec.io/training/2026-deconstr

    #NorthSec #cybersecurity #infosec #malwareanalysis #reverseengineering

  12. The new REMnux MCP server connects AI agents to 200+ malware analysis tools. I was surprised at the depth of investigation it can deliver: zeltser.com/ai-malware-analysi

    Most of my time on this project went into capturing how I approach malware analysis and making sure the server provides the right guidance at the right time, so that AI can think and adapt as it creates the workflow. The post includes interactive replays of real analysis sessions.

    #malware #malwareanalysis #infosec #cybersecurity #tools #artificialintelligence #AI

  13. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  14. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  15. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  16. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  17. Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).

    1. --export-png images lets you export images of the analysis

    2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file

    3. couple of small bug fixes and debugging related command line options

    You can try it on the web here: yaratoolkit.securitybreak.io/
    (I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)

    - Github: github.com/michelcrypt4d4mus/y
    - Pypi: pypi.org/project/yaralyzer/
    - on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer

    #ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules

  18. Recent research highlights a phishing campaign leveraging tax-related lures to deploy ValleyRAT, a modular RAT with strong persistence and evasion features.

    The infection chain demonstrates continued abuse of trusted binaries, DLL sideloading, and plugin-based architectures to enable targeted post-compromise activity. The campaign underscores the importance of monitoring user-facing entry points and low-noise persistence mechanisms.

    Open to insights on effective detection and response strategies for similar campaigns.
    Follow TechNadu for objective threat intelligence reporting.

    #InfoSec #ThreatHunting #MalwareAnalysis #PhishingDefense #EndpointSecurity #CyberThreats

  19. Researchers have documented a campaign abusing GitHub repositories themed as OSINT tools, GPT utilities, and developer resources to deliver PyStoreRAT, a modular, multi-stage remote access trojan.

    The operation leverages delayed malicious commits, minimal loader stubs, reputation manipulation, and HTA-based execution to reduce early detection. In parallel, a separate RAT campaign demonstrates region- and language-aware targeting logic.

    These cases underscore evolving tradecraft around trust abuse and script-based implants.
    How are you adapting repository vetting and execution controls in your environment?

    Source: thehackernews.com/2025/12/fake

    Engage in the discussion and follow TechNadu for measured infosec reporting.

    #InfoSec #ThreatIntel #MalwareAnalysis #GitHubSecurity #OpenSourceRisk #TechNadu

  20. Threat researchers are observing renewed use of unauthorized movie torrents as malware distribution vectors ahead of the Christmas 2025 season.

    Recent cases involve fileless malware such as Agent Tesla embedded within torrents labeled as popular Hollywood releases. These campaigns highlight how threat actors often rely on social and behavioral factors rather than technical complexity.

    How should security awareness adapt to predictable seasonal threat patterns?
    Engage in the discussion, share your insights, and follow us for continued InfoSec coverage.

    #InfoSec #ThreatIntelligence #MalwareAnalysis #FilelessMalware #SecurityAwareness #CyberThreats #TechNadu

  21. We're excited to announce that the Call for Trainers is now OPEN for DEF CON Training Las Vegas at DEF CON 34!

    Are you passionate about cybersecurity, hacking, and hands-on learning? Do you have expertise in emerging threats, defensive strategies, or cutting-edge security techniques? We want to hear from you!

    Visit training.defcon.org to submit your application by January 12, 2026.
    training.defcon.org/pages/2026

    #DEFCON #DEFCONTraining #Cybersecurity #Training #Hacking #InfoSec #SecurityCommunity #DEFCON2026 #DEFCON34 #DC34 #AI #RedTeam #BlueTeam #DigitalForensics #CyberTalent #MalwareAnalysis

  22. Could your next software update hide a ticking time bomb? Malicious NuGet packages are now creeping into trusted codeโ€”targeting databases and industrial systems with stealthy triggers that only go off on a specific date. How safe is your code, really?

    thedefendopsdiaries.com/malici

    #nugetsecurity
    #softwaresupplychain
    #malwareanalysis
    #industrialcontrolsystems
    #csharpextensionmethods

  23. Could your next software update hide a ticking time bomb? Malicious NuGet packages are now creeping into trusted codeโ€”targeting databases and industrial systems with stealthy triggers that only go off on a specific date. How safe is your code, really?

    thedefendopsdiaries.com/malici

    #nugetsecurity
    #softwaresupplychain
    #malwareanalysis
    #industrialcontrolsystems
    #csharpextensionmethods

  24. Could your next software update hide a ticking time bomb? Malicious NuGet packages are now creeping into trusted codeโ€”targeting databases and industrial systems with stealthy triggers that only go off on a specific date. How safe is your code, really?

    thedefendopsdiaries.com/malici

    #nugetsecurity
    #softwaresupplychain
    #malwareanalysis
    #industrialcontrolsystems
    #csharpextensionmethods

  25. Could your next software update hide a ticking time bomb? Malicious NuGet packages are now creeping into trusted codeโ€”targeting databases and industrial systems with stealthy triggers that only go off on a specific date. How safe is your code, really?

    thedefendopsdiaries.com/malici

    #nugetsecurity
    #softwaresupplychain
    #malwareanalysis
    #industrialcontrolsystems
    #csharpextensionmethods

  26. There is still time to register to join us for #DEFCONTraining at the Arab International Cybersecurity Conference & Exhibition hosted by the National Cyber Security Center Bahrain.

    Still on the fence? Hereโ€™s what past students had to say:

    โ€œMy first DEF CON & training and it was amazing!โ€

    โ€œExceeded expectations. High-quality content, organized course, well-delivered presentation by an experienced teacher.โ€

    โ€œFantastic and fun experience. Every single person was nice and approachable.โ€

    โ€œAbsolutely killer. Amazing instructors. Top tier after 20+ years of attending trainings.โ€

    Donโ€™t miss your chance to learn from our world-class trainers. Secure your spot today:
    training.defcon.org/collection

    #defcon #cyber #training #defconbahrain #AICS2025 #Bahrain #UAE #SaudiArabia #cybertraining #infosec #cybersecurity #cyberdefense #AI #pentesting #incidentresponse #cloud #software #supplychain #digitalforensics #cryptography #malwareanalysis #threathunting

  27. Today we have another #DEFCONTraining Bahrain Spotlight - โ€œA Complete Practical Approach to Malware Analysis & Threat Hunting with Memory Forensics, Endpoint Telemetry, & AI-Driven Huntingโ€ with Monnappa K A and Sajan Shetty on November 3-4.

    This 2-day intensive, hands-on training teaches the concepts, tools, and techniques required to analyze, investigate, and hunt malware by combining four powerful approaches: malware analysis, reverse engineering, memory forensics, and endpoint telemetry-based threat hunting. The course begins with the foundations of malware analysis, Windows internals, and memory forensics, before moving into advanced concepts of malware investigation and hunting adversary techniques.

    What makes this training unique and future-ready is the introduction to the concept of AI-powered autonomous hunting with the Garuda Threat Hunting Framework.

    Take a deeper look and register for this course today: training.defcon.org/collection

    Explore the full list of offerings in Bahrain at training.defcon.org/collection

    #defcon #cyber #training #defconbahrain #AICS2025 #Bahrain #UAE #SaudiArabia #cybertraining #infosec #cybersecurity #cyberdefense #malwareanalysis #threathunting #memoryforensics #AI #endpointtelemetry

  28. just released version 1.0.1 of The Yaralyzer, my unexpectedly popular tool for visualizing and forcibly decoding #YARA matches in binary data. Fixes a small bug when trying to choose a byte offset to force a UTF-16 or UTF-32 decoding of matched bytes.

    someone set up Yaralyzer as a #Kali package; not sure if that's made it into a release yet but if not the links are below.

    universeodon.com/@cryptadamist

    #ascii #asciiArt #blueteam #cybersecurity #detectionengineering #DFIR #forensics #FOSS #hacking #infosec #KaliLinux #malware #malwareDetection #malwareAnalysis #openSource #pdfalyzer #redteam #reverseEngineering #reversing #threathunting #yaralyze #yaralyzer #YARA #YARArule #YARArules

  29. Analysis of #Koske #miner.

    It is an AI-generated #Linux #malware which was hidden in images with pandas. It supports wide variety of coinminers for various cryptocurrencies and for GPU and different CPU architectures. Its another component, #rootkit #hideproc, tries to hide the Koske miner from file listings and processes.

    malwarelab.eu/posts/koske-pand

    Video from #anyrun analysis:

    youtube.com/watch?v=1OSPp996XQ4

    #koskeminer #coinminer #blueteam #cybersecurity #dfir #malwareanalysis #infosec #reverseengineering

  30. MalChela v3.0 enhances investigative workflows by introducing cases for organization, replacing MismatchMiner with FileMiner for improved file analysis, and suggesting tools based on file characteristics, streamlining the analysis process. #MalChela #DFIR #MalwareAnalysis

    bakerstreetforensics.com/2025/

  31. MalChela 2.2 โ€œREMnuxโ€ Release

    MalChelaโ€™s 2.2 update is packed with practical and platform-friendly improvements. It includes native support for REMnux, better tool settings, and deeper integrations with analysis tools like YARA-X, Tshark, Volatility3, and the newly improved fileanalyzer module.

    ๐Ÿฆ€ REMnux Edition: Built-In Support, Zero Tweaks

    When the GUI loads a REMnux-specific tools.yaml profile, it enters REMnux mode.

    Screenshot of yaml configuration applying REMnux mode

    Native binaries and Python scripts like capa, oledump.py, olevba, and FLOSS are loaded into the MalChela tools menu, allowing you to mix and match operations with the embedded MalChela utilities and the full REMnux tool stack. No manual configuration neededโ€”just launch and go. MalChela currently supports the following REMnux programs right out of the box:

    Tool NameDescriptionbinwalkFirmware analysis and extraction toolcapaIdentifies capabilities in executable filesradare2Advanced reverse engineering frameworkVolatility 3Memory forensics framework for RAM analysisexiftoolExtracts metadata from images, documents, and moreTSharkTerminal-based network packet analyzer (Wireshark CLI)mraptorDetects malicious macros in Office documentsoledumpParses OLE files and embedded streamsoleidIdentifies features in OLE files that may indicate threatsolevbaExtracts and analyzes VBA macros from Office filesrtfobjExtracts embedded objects from RTF documentszipdumpInspects contents of ZIP files, including suspicious payloadspdf-parserAnalyzes structure and contents of suspicious PDFsFLOSSReveals obfuscated and decoded strings in binariesclamscanOn-demand virus scanner using ClamAV enginestringsExtracts printable strings from binary filesYARA-XNext-generation high-performance YARA rule scanner

    If you only need a subset of tools you can easily save and restore that a custom profile.

    TShark Panel with Built-In Reference

    Tshark and the integrated field reference

    A new TShark integration exposes features including:

    • A filter builder panel
    • Commonly used fields reference
    • Tooltip hints for each example (e.g., `ip.addr == 192.168.1.1` shows โ€œAny traffic to or from 192.168.1.1โ€)
    • One-click copy support

    This helps analysts build and understand filters quicklyโ€”even if TShark isnโ€™t something they use every day. Using the syntax builder in MalChela you can use the exact commands directly in Tshark or Wireshark.

    YARA-X Support (Install Guide Included)

    YARA-X module in MalChela

    Support for YARA-X (via the `yr` binary) is now built in. YARA-X is not bundled with REMnux by default, but install instructions are included in the User Guide for both macOS and Linux users.

    Once installed, MalChela allows for rule-based scanning from the GUI,and with YARA-X, itโ€™s faster than ever.

    fileanalyzer: Fuzzy Hashing, PE Metadata, and More

    Updated FileAnalyzer Module

    MalChelaโ€™s fileanalyzer tool has also been updated to include:

    • Fuzzy hashing support via `ssdeep`
    • BLAKE3 hashing for fast, secure fingerprints
    • Expanded PE analysis, including:
    • Import and Export Table parsing (list of imported and exported functions)
    • Compilation Timestamp (for detection of suspicious or forged build times)
    • Section Characteristics (flags like IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, etc., for detecting anomalous sections)

    These improvements provide deeper insight into executable structure, helping analysts detect anomalies such as packers, suspicious timestamps, or unexpected imports/exports. Useful for everything from sample triage to correlation, fileanalyzer now digs deeperโ€”without slowing down.

    Memory Forensics Gets a Boost: Volatility 3 Now Supported

    With the 2.2 release, MalChela introduces support for Volatility 3, the modern Python-based memory forensics framework. Whether youโ€™re running MalChela in REMnux or on a customized macOS or Linux setup, you can now access the full power of Volatility directly from the MalChela GUI.

    Volatility 3 in MalChela

    Thereโ€™s an intuitive plugin selector that dynamically adjusts available arguments based on your chosen plugin,. You can search, sort, and browse available plugins, and even toggle output options like โ€“dump-dir with ease.

    Like Tshark, there is an added plugin reference panel with searchable descriptions and argument overviews โ€” a real time-saver when navigating Volatilityโ€™s deep and often complex toolset.

    Volatility Plugin Reference

    Smarter Tool Configuration via YAML

    The tool configuration system continues to evolve:

    • Tools now declare their input type (file, folder, or hash)
    • The GUI dynamically adjusts the interface to match
    • Alternate profiles (like REMnux setups) can be managed simply by swapping `tools.yaml` files via the GUI
    • Easily backup or restore your custom setups
    • Restore the default toolset to get back to basics

    This structure helps keep things cleanโ€”whether youโ€™re testing, teaching, or deploying in a lab environment.

    Embedded Documentation Access

    The GUI now includes a link to the full MalChela User Guide in PDF. You can also access the documentation online.

    From tool usage and CLI flags to configuration tips and install steps, itโ€™s all just a click awayโ€”especially useful in offline environments or when onboarding new analysts. Iโ€™ll be honest, this is likely the most comprehensive user guide Iโ€™ve ever written.

    Whether youโ€™re reviewing binaries, building hash sets, or exploring network capturesโ€”MalChela 2.2 is designed bring together the tools you need, and make it easier to interoperate between them.

    The new REMnux mode makes it even easier to get up and running with dozens of third party integrations.

    Have an idea for a feature or application youโ€™d like to see supported โ€” reach out to me.

    GitHub: REMnux Release

    MalChela User Guide: Online, PDF, Web

    Shop: T-shirts, hats, stickers, and more

    #DFIR #Github #MalChela #Malware #MalwareAnalysis #Memory #Network #NSRL #PCAP #Python #REMnux #Rust #Tshark #VirusTotal #Volatility #yara

  32. With our team at Stratosphere Laboratory AIC FEE CTU, we are organising this year's Honeynet Project Workshop 2025 in Prague!

    It will be a unique space to share your passion for deception technologies, honeypots, and cybersecurity with industry leaders and fellow researchers!

    ๐Ÿ”” We are looking for sponsors who want to support deception research!
    ๐Ÿ”” Early birds are still open until April 29th! Grab your tickets!
    ๐Ÿ”” Last days to submit your training and talks proposals!
    ๐Ÿ”” Students can apply for a Cรฉdric Blancher Memorial Scholarship!

    This is the first time the conference is coming to Prague, with previous editions hosted in Copenhagen (2024), Innsbruck (2019), Taipei (2018), Canberra (2017), San Antonio (2016), Stavanger (2015), Warsaw (2014), Dubai (2013), San Francisco (2012), Paris (2011), Mexico City (2010) and Kuala Lumpur (2009).

    What a unique opportunity!

    ๐Ÿ”— prague2025.honeynet.org/

    Boost and help us spread the word! ๐Ÿ‘พ

    #honeynet #cybersecurity #deception #honeypots #infosec #prague #praguetoday #SecurityConference #ThreatIntel #MalwareAnalysis #PragueEvents

  33. For hobbyist Cobalt Strike Beacon collectors, note that the recently announced 4.11 update introduces a number of changes to frustrate Beacon configuration extraction, namely through the new `transform-obfuscate` field.

    When set, this field can apply multiple layers of encoding, encryption and compression (with some recent Beacons observed with a 32 byte XOR key, configurable upto 2048 bytes!).

    While still reasonably trivial to decode manually, standard automated workflows (say, through the SentinelOne parser) will now fail, not least because of changes to the well-known field markers.

    Beacons with these characteristics have thus far been observed with watermarks indicative of licensed instances, though I imagine it is only a matter of time before the 4.11 capabilities become accessible to all manner of miscreants.

    A sample configuration, via a staged Beacon on 104.42.26[.]200 is attached, including the three distinct XOR keys used to decode it.

    cobaltstrike.com/blog/cobalt-s

    #cobaltstrike #malwareanalysis #forensics #blueteam

  34. The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

    exploitreversing.com/2025/01/0

    I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

    Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

    Have a great day.

    #windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis

  35. The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:

    exploitreversing.com/2025/01/0

    I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.

    Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).

    Have a great day.

    #windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis

  36. LABORATORIOS GRATUITOS PARA PONER A PRUEBA TUS HABILIDADES DE REDTEAM-BLUETEAM y CTF

    ยท Ataque-Defensa - attackdefense.com
    ยท Alerta para ganar - alf.nu/alert1
    ยท Bangkok - bancocn.com
    ยท CTF Komodo Seguridad - ctf.komodosec.com
    ยท CryptoHack - cryptohack.org/
    ยท Desafรญo CMD - cmdchallenge.com
    ยท Explotaciรณn educativa - exploit.education
    ยท Google CTF - lnkd.in/e46drbz8
    ยท HackTheBox - hackthebox.com
    ยท Hackthis - hackthis.co.uk
    ยท Hacksplaining - lnkd.in/eAB5CSTA
    ยท Hacker101 - ctf.hacker101.com
    ยท Hacker de seguridad - lnkd.in/ex7R-C-e
    ยท Hacking-Lab - hacking-lab.com/
    ยท HSTRIKE - hstrike.com
    ยท ImmersiveLabs - immersivelabs.com
    ยท Concurso de novatos - lnkd.in/ewBk6fU5
    ยท OverTheWire - overthewire.org
    ยท Laboratorios Prรกcticos Pentest - lnkd.in/esq9Yuv5
    ยท Pentestlab - pentesterlab.com
    ยท Hackaflag BR - hackaflag.com.br/
    ยท Laboratorios de prรกctica de pruebas de penetraciรณn - lnkd.in/e6wVANYd
    ยท PentestIT LAB - lab.pentestit.ru
    ยท PicoCTF - picoctf.com
    ยท PWNABLE - lnkd.in/eMEwBJzn
    ยท Root-Me - root-me.org
    ยท Root en la cรกrcel - rootinjail.com
    ยท SANS Challenger - lnkd.in/e5TAMawK
    ยท SmashTheStack - lnkd.in/eVn9rP9p
    ยท Los desafรญos de Cryptopals Crypto - cryptopals.com
    ยท Prueba Hack Me - tryhackme.com
    ยท Vulnhub - vulnhub.com
    ยท W3Challs - w3challs.com
    ยท WeChall - wechall.net
    ยท Zenk-Seguridad - lnkd.in/ewJ5rNx2
    ยท Ciberdefensores - lnkd.in/dVcmjEw8
    ยท TrytoHackme - www.tryhackme.com Vรญa : Unai Rubio en LinkedIn. #Ciberseguridad #Cybersecurity #CTF #RedTeam #BlueTeam
    #Hacking #Pentesting #Infosec #EthicalHacking #CyberDefense
    #CyberSkills #CaptureTheFlag #SecurityAwareness
    #VulnerabilityAssessment #ThreatHunting #MalwareAnalysis
    #IncidentResponse #CyberTraining