#malwareanalysis โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #malwareanalysis, aggregated by home.social.
-
We're excited to announce that the Call for Trainers is now OPEN for DEF CON Training Middle East!
Are you passionate about cybersecurity, hacking, and hands-on learning? Do you have expertise in emerging threats, defensive strategies, or cutting-edge security techniques? We want to hear from you!
Visit training.defcon.org to submit your trainer application for a two-day or three-day course by May 9, 2026.
https://training.defcon.org/pages/2026-middle-east-call-for-trainers#DEFCON #DEFCONTraining #Cybersecurity #Training #Hacking #InfoSec #SecurityCommunity #DEFCONMiddleEast #AI #RedTeam #BlueTeam #DigitalForensics #CyberTalent #MalwareAnalysis
-
CW: Full toolkit (3 samples + scripts + YARA):(no download needed)
https://archive.org/details/500ms-supply-chain-verification-toolkit
The name references Andres Freund's 500ms SSH delay that uncovered the
XZ backdoor.The core finding: JsonSchema.Net.dll shipped in Microsoft's
DesktopAppInstaller has a SHA256 that doesn't match any official NuGet
release. It has a PE timestamp of year 2095. And it's signed by
Microsoft's HSM.You can verify this on your own Windows 11 machine without downloading
anything from me:Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\ConfigurationRemotingServer\JsonSchema.Net.dll"
Compare with NuGet official: https://www.nuget.org/packages/JsonSchema.Net/7.2.3
The toolkit also includes anomalies in Google's cloudcode_cli (104K
internal refs) and Intel's IGCCTray (GCP data exfil in a graphics driver).๐ 500ms โ Supply chain anomalies in Windows 11 default binaries
JsonSchema.Net.dll in Microsoft DesktopAppInstaller:
โ Hash โ any official NuGet release
โ PE timestamp: year 2095
โ Signed by Microsoft HSM post-modificationVerify on YOUR OWN Windows 11 (no download needed):
Get-FileHash "C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller*\...\JsonSchema.Net.dll"
Compare: nuget.org/packages/JsonSchema.Net/7.2.3#infosec #supplychainattack #malwareanalysis #microsoft #cybersecurity #threatintel #windows11 #forensics
-
Tried to book a bar. Ended up reverse engineering a malware campaign instead.
A fake "Cloudflare verify" page copied an obfuscated PowerShell loader to my clipboard. So I broke it down:
XOR-obfuscated script
Payload delivery
RedCap infostealer analysis
REMnux, Ghidra & Hybrid AnalysisAlso watched the infrastructure get taken down mid-write-up.
First time doing any RE
https://blog.michaelrbparker.com/post/17
(Still haven't booked that drink.)
-
๐ Just released smali-lsp!
A Language Server for Smali with:
โข Goto definition
โข Cross-references
โข Symbols & hover
โข Works with any IDE (minimal setup)Also includes an MCP server โ plug into AI agents for faster APK analysis ๐ค
๐ https://github.com/Surendrajat/smali-lsp
#AndroidDev #ReverseEngineering #MalwareAnalysis #LSP #InfoSec #RE #security #dalvik
-
๐ Just released smali-lsp!
A Language Server for Smali with:
โข Goto definition
โข Cross-references
โข Symbols & hover
โข Works with any IDE (minimal setup)Also includes an MCP server โ plug into AI agents for faster APK analysis ๐ค
๐ https://github.com/Surendrajat/smali-lsp
#AndroidDev #ReverseEngineering #MalwareAnalysis #LSP #InfoSec #RE #security #dalvik
-
๐ Just released smali-lsp!
A Language Server for Smali with:
โข Goto definition
โข Cross-references
โข Symbols & hover
โข Works with any IDE (minimal setup)Also includes an MCP server โ plug into AI agents for faster APK analysis ๐ค
๐ https://github.com/Surendrajat/smali-lsp
#AndroidDev #ReverseEngineering #MalwareAnalysis #LSP #InfoSec #RE #security #dalvik
-
#ReverseEngineering mit #KI? @martin_fmi erklรคrt, wie #LLMs Malware-Muster erkennen, externe Systemaufrufe rekonstruieren & versteckte Architekturen sichtbar machen. Selbst bei obfuskiertem Code.
Lesen & auf den Ernstfall vorbereiten: https://javapro.io/de/ki-gesteuertes-reverse-engineering-von-java-anwendungen/
-
APT37โs Ruby Jumper campaign demonstrates a mature approach to air-gap traversal.
Observed tradecraft includes:
โข LNK-based initial execution
โข Embedded PowerShell payload extraction
โข Ruby interpreter abuse (v3.3.0)
โข Scheduled task persistence (5-minute interval)
โข USB-based covert bidirectional C2
โข Multi-stage backdoor deployment
Toolset: RESTLEAF, SNAKEDROPPER, THUMBSBD, VIRUSTASK, FOOTWINE, BLUELIGHT.The removable media relay model enables:
โ Command staging offline
โ Data exfiltration without internet access
โ Lateral spread across isolated systems
โ Surveillance via Windows spyware
This reinforces a critical point:
Air-gap controls must extend beyond physical disconnection โ including USB governance, device auditing, behavioral monitoring, and strict runtime execution policies.Are critical infrastructure operators prepared for USB-mediated C2 relays?
Engage below.
Follow TechNadu for high-signal threat intelligence insights.
Repost to elevate awareness.#Infosec #APT37 #AirGapSecurity #ThreatModeling #MalwareAnalysis #NationStateThreats #USBExfiltration #SOC #DetectionEngineering #CyberDefense #OperationalSecurity #ThreatHunting #ZeroTrustArchitecture
-
RE: https://infosec.exchange/@washi/116109971111061839
MY MORTAL ENEMY IS THAT ONE zgRAT YARA RULE IT SHOWS UP FREAKING EVERYWHERE AND IS SO WRONG ASDHFJDSHFHASFHSDJAH
thank you for this Washi! I learned some things about .NET from this post as well!
popping on the #ReverseEngineering #MalwareAnalysis tags too
-
REMnux 8 รจ la nuova versione della distribuzione Linux dedicata allโanalisi di malware, con strumenti aggiornati, container ottimizzati e un ambiente piรน stabile per ricercatori e analisti. #REMnux #MalwareAnalysis #Forensics #CyberSecurity #Linux
-
๐๏ธ ๐ก๐ผ๐ฟ๐๐ต๐ฆ๐ฒ๐ฐ ๐ฎ๐ฌ๐ฎ๐ฒ ๐๐ผ๐ฟ๐บ๐ฎ๐๐ถ๐ผ๐ป๐/๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด๐ (5/12): "Deconstructing Rust Binaries" ๐ฝ๐ฎ๐ฟ/๐ฏ๐ Cindy Xiao
๐ Dates: May 11, 12 and 13, 2026 (3 days)
๐ Difficulty: Medium
๐ฅ๏ธ Mode: Hybrid (on-site & remote)Description:
"๐๐ถ๐ด๐ต-๐ฃ๐ข๐ด๐ฆ๐ฅ ๐ฎ๐ข๐ญ๐ธ๐ข๐ณ๐ฆ ๐ช๐ด ๐ข ๐จ๐ณ๐ฐ๐ธ๐ช๐ฏ๐จ ๐ต๐ฉ๐ณ๐ฆ๐ข๐ต. ๐๐ฆ๐ค๐ฐ๐ฏ๐ด๐ต๐ณ๐ถ๐ค๐ต๐ช๐ฏ๐จ ๐๐ถ๐ด๐ต ๐๐ช๐ฏ๐ข๐ณ๐ช๐ฆ๐ด ๐ฆ๐ฒ๐ถ๐ช๐ฑ๐ด ๐ณ๐ฆ๐ท๐ฆ๐ณ๐ด๐ฆ ๐ฆ๐ฏ๐จ๐ช๐ฏ๐ฆ๐ฆ๐ณ๐ด ๐ข๐ฏ๐ฅ ๐ฎ๐ข๐ญ๐ธ๐ข๐ณ๐ฆ ๐ข๐ฏ๐ข๐ญ๐บ๐ด๐ต๐ด ๐ธ๐ช๐ต๐ฉ ๐ฆ๐ด๐ด๐ฆ๐ฏ๐ต๐ช๐ข๐ญ ๐ด๐ฌ๐ช๐ญ๐ญ๐ด ๐ง๐ฐ๐ณ ๐ต๐ข๐ค๐ฌ๐ญ๐ช๐ฏ๐จ ๐ข ๐ฏ๐ฆ๐ธ ๐ค๐ฉ๐ข๐ญ๐ญ๐ฆ๐ฏ๐จ๐ฆ. ๐๐บ๐ฏ๐ข๐ฎ๐ช๐ค ๐ฃ๐ช๐ฏ๐ข๐ณ๐ช๐ฆ๐ด ๐ข๐ณ๐ฆ ๐ช๐ฏ๐ค๐ณ๐ฆ๐ข๐ด๐ช๐ฏ๐จ๐ญ๐บ ๐ฎ๐ฐ๐ท๐ช๐ฏ๐จ ๐ต๐ฐ๐ธ๐ข๐ณ๐ฅ๐ด ๐๐ถ๐ด๐ต, ๐บ๐ฆ๐ต ๐ณ๐ฆ๐ท๐ฆ๐ณ๐ด๐ฆ ๐ฆ๐ฏ๐จ๐ช๐ฏ๐ฆ๐ฆ๐ณ๐ด ๐ญ๐ข๐ค๐ฌ ๐ต๐ฉ๐ฆ ๐ด๐ฑ๐ฆ๐ค๐ช๐ข๐ญ๐ช๐ป๐ฆ๐ฅ ๐ฌ๐ฏ๐ฐ๐ธ๐ญ๐ฆ๐ฅ๐จ๐ฆ ๐ต๐ฐ ๐ฅ๐ฆ๐ค๐ฐ๐ฅ๐ฆ ๐ต๐ฉ๐ฆ๐ฎ. ๐๐ฉ๐ช๐ด ๐ง๐ช๐ณ๐ด๐ต-๐ฐ๐ง-๐ช๐ต๐ด-๐ฌ๐ช๐ฏ๐ฅ ๐ค๐ฐ๐ถ๐ณ๐ด๐ฆ ๐ฃ๐ณ๐ช๐ฅ๐จ๐ฆ๐ด ๐ต๐ฉ๐ข๐ต ๐ค๐ณ๐ช๐ต๐ช๐ค๐ข๐ญ ๐จ๐ข๐ฑ. ๐๐ฉ๐ณ๐ฐ๐ถ๐จ๐ฉ ๐ข ๐ญ๐ข๐ฏ๐จ๐ถ๐ข๐จ๐ฆ-๐ค๐ฆ๐ฏ๐ต๐ณ๐ช๐ค ๐ข๐ฑ๐ฑ๐ณ๐ฐ๐ข๐ค๐ฉ, ๐บ๐ฐ๐ถ'๐ญ๐ญ ๐ญ๐ฆ๐ข๐ณ๐ฏ ๐๐ถ๐ด๐ต ๐ง๐ถ๐ฏ๐ฅ๐ข๐ฎ๐ฆ๐ฏ๐ต๐ข๐ญ๐ด, ๐ถ๐ฏ๐ฅ๐ฆ๐ณ๐ด๐ต๐ข๐ฏ๐ฅ ๐ฉ๐ฐ๐ธ ๐๐ถ๐ด๐ต ๐ค๐ฐ๐ฏ๐ด๐ต๐ณ๐ถ๐ค๐ต๐ด ๐ต๐ณ๐ข๐ฏ๐ด๐ญ๐ข๐ต๐ฆ ๐ต๐ฐ ๐ข๐ด๐ด๐ฆ๐ฎ๐ฃ๐ญ๐บ, ๐ข๐ฏ๐ฅ ๐ฎ๐ข๐ด๐ต๐ฆ๐ณ ๐ฑ๐ณ๐ข๐ค๐ต๐ช๐ค๐ข๐ญ ๐ต๐ณ๐ช๐ข๐จ๐ฆ ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ฒ๐ถ๐ฆ๐ด. ๐ ๐ฐ๐ถ'๐ญ๐ญ ๐ต๐ณ๐ข๐ค๐ฆ ๐ฅ๐ข๐ต๐ข ๐ง๐ญ๐ฐ๐ธ๐ด, ๐ช๐ฅ๐ฆ๐ฏ๐ต๐ช๐ง๐บ ๐ง๐ถ๐ฏ๐ค๐ต๐ช๐ฐ๐ฏ๐ข๐ญ๐ช๐ต๐บ, ๐ข๐ฏ๐ฅ ๐ฅ๐ฆ๐ค๐ฐ๐ฏ๐ด๐ต๐ณ๐ถ๐ค๐ต ๐ณ๐ฆ๐ข๐ญ ๐๐ถ๐ด๐ต ๐ฎ๐ข๐ญ๐ธ๐ข๐ณ๐ฆ ๐ด๐ข๐ฎ๐ฑ๐ญ๐ฆ๐ด ๐ช๐ฏ ๐ข ๐ด๐ต๐ณ๐ถ๐ค๐ต๐ถ๐ณ๐ฆ๐ฅ, ๐ฆ๐ง๐ง๐ช๐ค๐ช๐ฆ๐ฏ๐ต ๐ธ๐ข๐บ. ๐๐ฉ๐ฆ๐ต๐ฉ๐ฆ๐ณ ๐บ๐ฐ๐ถ'๐ณ๐ฆ ๐ข๐ฏ๐ข๐ญ๐บ๐ป๐ช๐ฏ๐จ ๐ณ๐ข๐ฏ๐ด๐ฐ๐ฎ๐ธ๐ข๐ณ๐ฆ ๐ฐ๐ณ ๐ข๐ฏ๐ข๐ญ๐บ๐ป๐ช๐ฏ๐จ ๐ญ๐ฆ๐จ๐ช๐ต๐ช๐ฎ๐ข๐ต๐ฆ ๐๐ถ๐ด๐ต-๐ฃ๐ข๐ด๐ฆ๐ฅ ๐ด๐บ๐ด๐ต๐ฆ๐ฎ๐ด, ๐บ๐ฐ๐ถ'๐ญ๐ญ ๐ฅ๐ฆ๐ท๐ฆ๐ญ๐ฐ๐ฑ ๐ต๐ฉ๐ฆ ๐ต๐ณ๐ข๐ฅ๐ฆ๐ค๐ณ๐ข๐ง๐ต ๐ฏ๐ฆ๐ฆ๐ฅ๐ฆ๐ฅ ๐ต๐ฐ ๐ฒ๐ถ๐ช๐ค๐ฌ๐ญ๐บ ๐ถ๐ฏ๐ฅ๐ฆ๐ณ๐ด๐ต๐ข๐ฏ๐ฅ ๐ข๐ฏ๐ฅ ๐ฃ๐ณ๐ฆ๐ข๐ฌ ๐ฅ๐ฐ๐ธ๐ฏ ๐๐ถ๐ด๐ต ๐ฃ๐ช๐ฏ๐ข๐ณ๐ช๐ฆ๐ด ๐ธ๐ช๐ต๐ฉ ๐ค๐ฐ๐ฏ๐ง๐ช๐ฅ๐ฆ๐ฏ๐ค๐ฆ."About the trainer:
Cindy Xiao is an experienced malware reverse engineer with specialized expertise in analyzing Rust binaries. She brings real-world knowledge of emerging Rust-based threats and combines technical depth with practical, hands-on instruction to help security professionals rapidly upskill in this critical domain.๐ Training details: https://nsec.io/training/2026-deconstructing-rust-binaries/
#NorthSec #cybersecurity #infosec #malwareanalysis #reverseengineering
-
The new REMnux MCP server connects AI agents to 200+ malware analysis tools. I was surprised at the depth of investigation it can deliver: https://zeltser.com/ai-malware-analysis-remnux
Most of my time on this project went into capturing how I approach malware analysis and making sure the server provides the right guidance at the right time, so that AI can think and adapt as it creates the workflow. The post includes interactive replays of real analysis sessions.
#malware #malwareanalysis #infosec #cybersecurity #tools #artificialintelligence #AI
-
Malware W32/SkyAI uses AI? So do I.
#malwareanalysis #reverseengineeringhttps://cryptax.medium.com/w32-skyai-uses-ai-so-do-i-d33f04d63534
-
Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).
1. --export-png images lets you export images of the analysis
2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file
3. couple of small bug fixes and debugging related command line options
You can try it on the web here: https://yaratoolkit.securitybreak.io/
(I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)- Github: https://github.com/michelcrypt4d4mus/yaralyzer
- Pypi: https://pypi.org/project/yaralyzer/
- on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules
-
Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).
1. --export-png images lets you export images of the analysis
2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file
3. couple of small bug fixes and debugging related command line options
You can try it on the web here: https://yaratoolkit.securitybreak.io/
(I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)- Github: https://github.com/michelcrypt4d4mus/yaralyzer
- Pypi: https://pypi.org/project/yaralyzer/
- on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules
-
Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).
1. --export-png images lets you export images of the analysis
2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file
3. couple of small bug fixes and debugging related command line options
You can try it on the web here: https://yaratoolkit.securitybreak.io/
(I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)- Github: https://github.com/michelcrypt4d4mus/yaralyzer
- Pypi: https://pypi.org/project/yaralyzer/
- on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules
-
Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).
1. --export-png images lets you export images of the analysis
2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file
3. couple of small bug fixes and debugging related command line options
You can try it on the web here: https://yaratoolkit.securitybreak.io/
(I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)- Github: https://github.com/michelcrypt4d4mus/yaralyzer
- Pypi: https://pypi.org/project/yaralyzer/
- on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules
-
Released v1.3.3. of #Yaralyzer, my surprisingly popular tool for visualizing YARA rule matches with colors (a lot of colors).
1. --export-png images lets you export images of the analysis
2. almost all command line options (including multi argument ones like --yara-rules-dir) can be permanently set via environment variables or .yaralyzer file
3. couple of small bug fixes and debugging related command line options
You can try it on the web here: https://yaratoolkit.securitybreak.io/
(I didn't build this website, Thomas Roccia from Microsoft just integrated Yaralyzer into his existing site)- Github: https://github.com/michelcrypt4d4mus/yaralyzer
- Pypi: https://pypi.org/project/yaralyzer/
- on macOS you can also get it with #Homebrew by installing Pdfalyzer: brew install pdfalyzer#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #GPL #hacking #infosec #KaliLinux #maldoc #malware #malwareAnalysis #malwareDetection #openSource #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #YARA #YARArule #YARArules
-
Recent research highlights a phishing campaign leveraging tax-related lures to deploy ValleyRAT, a modular RAT with strong persistence and evasion features.
The infection chain demonstrates continued abuse of trusted binaries, DLL sideloading, and plugin-based architectures to enable targeted post-compromise activity. The campaign underscores the importance of monitoring user-facing entry points and low-noise persistence mechanisms.
Open to insights on effective detection and response strategies for similar campaigns.
Follow TechNadu for objective threat intelligence reporting.#InfoSec #ThreatHunting #MalwareAnalysis #PhishingDefense #EndpointSecurity #CyberThreats
-
Researchers have documented a campaign abusing GitHub repositories themed as OSINT tools, GPT utilities, and developer resources to deliver PyStoreRAT, a modular, multi-stage remote access trojan.
The operation leverages delayed malicious commits, minimal loader stubs, reputation manipulation, and HTA-based execution to reduce early detection. In parallel, a separate RAT campaign demonstrates region- and language-aware targeting logic.
These cases underscore evolving tradecraft around trust abuse and script-based implants.
How are you adapting repository vetting and execution controls in your environment?Source: https://thehackernews.com/2025/12/fake-osint-and-gpt-utility-github-repos.html
Engage in the discussion and follow TechNadu for measured infosec reporting.
#InfoSec #ThreatIntel #MalwareAnalysis #GitHubSecurity #OpenSourceRisk #TechNadu
-
Threat researchers are observing renewed use of unauthorized movie torrents as malware distribution vectors ahead of the Christmas 2025 season.
Recent cases involve fileless malware such as Agent Tesla embedded within torrents labeled as popular Hollywood releases. These campaigns highlight how threat actors often rely on social and behavioral factors rather than technical complexity.
How should security awareness adapt to predictable seasonal threat patterns?
Engage in the discussion, share your insights, and follow us for continued InfoSec coverage.#InfoSec #ThreatIntelligence #MalwareAnalysis #FilelessMalware #SecurityAwareness #CyberThreats #TechNadu
-
We're excited to announce that the Call for Trainers is now OPEN for DEF CON Training Las Vegas at DEF CON 34!
Are you passionate about cybersecurity, hacking, and hands-on learning? Do you have expertise in emerging threats, defensive strategies, or cutting-edge security techniques? We want to hear from you!
Visit training.defcon.org to submit your application by January 12, 2026.
https://training.defcon.org/pages/2026-las-vegas-call-for-trainers#DEFCON #DEFCONTraining #Cybersecurity #Training #Hacking #InfoSec #SecurityCommunity #DEFCON2026 #DEFCON34 #DC34 #AI #RedTeam #BlueTeam #DigitalForensics #CyberTalent #MalwareAnalysis
-
Could your next software update hide a ticking time bomb? Malicious NuGet packages are now creeping into trusted codeโtargeting databases and industrial systems with stealthy triggers that only go off on a specific date. How safe is your code, really?
#nugetsecurity
#softwaresupplychain
#malwareanalysis
#industrialcontrolsystems
#csharpextensionmethods -
Could your next software update hide a ticking time bomb? Malicious NuGet packages are now creeping into trusted codeโtargeting databases and industrial systems with stealthy triggers that only go off on a specific date. How safe is your code, really?
#nugetsecurity
#softwaresupplychain
#malwareanalysis
#industrialcontrolsystems
#csharpextensionmethods -
Could your next software update hide a ticking time bomb? Malicious NuGet packages are now creeping into trusted codeโtargeting databases and industrial systems with stealthy triggers that only go off on a specific date. How safe is your code, really?
#nugetsecurity
#softwaresupplychain
#malwareanalysis
#industrialcontrolsystems
#csharpextensionmethods -
Could your next software update hide a ticking time bomb? Malicious NuGet packages are now creeping into trusted codeโtargeting databases and industrial systems with stealthy triggers that only go off on a specific date. How safe is your code, really?
#nugetsecurity
#softwaresupplychain
#malwareanalysis
#industrialcontrolsystems
#csharpextensionmethods -
A trusted Solidity extension turned traitor โ the SleepyDuck Trojan used blockchain to stealthily control developersโ tools. Could your favorite extension be hiding a dark secret?
#sleepyduck
#soliditysecurity
#openvsx
#blockchainmalware
#vscodeextension
#cyberthreats
#malwareanalysis
#developersecurity
#infosec -
There is still time to register to join us for #DEFCONTraining at the Arab International Cybersecurity Conference & Exhibition hosted by the National Cyber Security Center Bahrain.
Still on the fence? Hereโs what past students had to say:
โMy first DEF CON & training and it was amazing!โ
โExceeded expectations. High-quality content, organized course, well-delivered presentation by an experienced teacher.โ
โFantastic and fun experience. Every single person was nice and approachable.โ
โAbsolutely killer. Amazing instructors. Top tier after 20+ years of attending trainings.โ
Donโt miss your chance to learn from our world-class trainers. Secure your spot today:
https://training.defcon.org/collections/arab-cybersecurity-2025#defcon #cyber #training #defconbahrain #AICS2025 #Bahrain #UAE #SaudiArabia #cybertraining #infosec #cybersecurity #cyberdefense #AI #pentesting #incidentresponse #cloud #software #supplychain #digitalforensics #cryptography #malwareanalysis #threathunting
-
Today we have another #DEFCONTraining Bahrain Spotlight - โA Complete Practical Approach to Malware Analysis & Threat Hunting with Memory Forensics, Endpoint Telemetry, & AI-Driven Huntingโ with Monnappa K A and Sajan Shetty on November 3-4.
This 2-day intensive, hands-on training teaches the concepts, tools, and techniques required to analyze, investigate, and hunt malware by combining four powerful approaches: malware analysis, reverse engineering, memory forensics, and endpoint telemetry-based threat hunting. The course begins with the foundations of malware analysis, Windows internals, and memory forensics, before moving into advanced concepts of malware investigation and hunting adversary techniques.
What makes this training unique and future-ready is the introduction to the concept of AI-powered autonomous hunting with the Garuda Threat Hunting Framework.
Take a deeper look and register for this course today: https://training.defcon.org/collections/arab-cybersecurity-2025/products/monnappa-k-a-a-complete-practical-approach-to-malware-analysis-threat-hunting-using-memory-forensics-dctlv2025-copy
Explore the full list of offerings in Bahrain at https://training.defcon.org/collections/arab-cybersecurity-2025
#defcon #cyber #training #defconbahrain #AICS2025 #Bahrain #UAE #SaudiArabia #cybertraining #infosec #cybersecurity #cyberdefense #malwareanalysis #threathunting #memoryforensics #AI #endpointtelemetry -
Used some #AI to jury rig a basic API documentation site for The Yaralyzer, my unexpectedly popular tool for visualizing and forcibly decoding #YARA matches in binary data.
* GitHub: https://github.com/michelcrypt4d4mus/yaralyzer
* PyPi: https://pypi.org/project/yaralyzer/
* API documentation: https://michelcrypt4d4mus.github.io/yaralyzer/api/
* Can also be installed (indirectly) via homebrew if you install The #Pdfalyzer (different tool)#ascii #asciiArt #blueteam #cybersecurity #detectionengineering #DFIR #forensics #FOSS #hacking #infosec #KaliLinux #malware #malwareDetection #malwareAnalysis #openSource #pdfalyzer #redteam #reverseEngineering #reversing #threathunting #yaralyze #yaralyzer #YARA #YARArule #YARArules
-
Just released version 1.16.8 of The Pdfalyzer with a bunch of new and updated #YARA rules to scan #PDF files for malicious content. Links in the quoted toot below.
https://universeodon.com/@cryptadamist/114768170683991686
#ascii #asciiArt #blueteam #cybersecurity #detectionEngineering #DFIR #forensics #FOSS #hacking #homebrew #infosec #KaliLinux #malware #malwareDetection #malwareAnalysis #openSource #pdf #pdfs #pdfalyzer #pypi #python #redteam #reverseEngineering #reversing #Threatassessment #threathunting #yaralyze #yaralyzer #YARA #YARArule #YARArules
-
just released version 1.0.1 of The Yaralyzer, my unexpectedly popular tool for visualizing and forcibly decoding #YARA matches in binary data. Fixes a small bug when trying to choose a byte offset to force a UTF-16 or UTF-32 decoding of matched bytes.
someone set up Yaralyzer as a #Kali package; not sure if that's made it into a release yet but if not the links are below.
https://universeodon.com/@cryptadamist/113642071681749608
#ascii #asciiArt #blueteam #cybersecurity #detectionengineering #DFIR #forensics #FOSS #hacking #infosec #KaliLinux #malware #malwareDetection #malwareAnalysis #openSource #pdfalyzer #redteam #reverseEngineering #reversing #threathunting #yaralyze #yaralyzer #YARA #YARArule #YARArules
-
It is an AI-generated #Linux #malware which was hidden in images with pandas. It supports wide variety of coinminers for various cryptocurrencies and for GPU and different CPU architectures. Its another component, #rootkit #hideproc, tries to hide the Koske miner from file listings and processes.
https://malwarelab.eu/posts/koske-panda-ai/
Video from #anyrun analysis:
https://www.youtube.com/watch?v=1OSPp996XQ4
#koskeminer #coinminer #blueteam #cybersecurity #dfir #malwareanalysis #infosec #reverseengineering
-
MalChela v3.0 enhances investigative workflows by introducing cases for organization, replacing MismatchMiner with FileMiner for improved file analysis, and suggesting tools based on file characteristics, streamlining the analysis process. #MalChela #DFIR #MalwareAnalysis
-
Hashes for the Masses: Finding What Matters in a Sea of Samples #DFIR #MalwareAnalysis #Hash #MalChela
-
MalChela 2.2 โREMnuxโ Release
More tools. More Docs. More Power.
#DFIR #MalwareAnalysis #YaraX #Volatility #Tshark #MalChelahttp://bakerstreetforensics.com/2025/05/21/malchela-2-2-remnux-release/
-
MalChela 2.2 โREMnuxโ Release
MalChelaโs 2.2 update is packed with practical and platform-friendly improvements. It includes native support for REMnux, better tool settings, and deeper integrations with analysis tools like YARA-X, Tshark, Volatility3, and the newly improved fileanalyzer module.
๐ฆ REMnux Edition: Built-In Support, Zero Tweaks
When the GUI loads a REMnux-specific tools.yaml profile, it enters REMnux mode.
Screenshot of yaml configuration applying REMnux modeNative binaries and Python scripts like capa, oledump.py, olevba, and FLOSS are loaded into the MalChela tools menu, allowing you to mix and match operations with the embedded MalChela utilities and the full REMnux tool stack. No manual configuration neededโjust launch and go. MalChela currently supports the following REMnux programs right out of the box:
Tool NameDescriptionbinwalkFirmware analysis and extraction toolcapaIdentifies capabilities in executable filesradare2Advanced reverse engineering frameworkVolatility 3Memory forensics framework for RAM analysisexiftoolExtracts metadata from images, documents, and moreTSharkTerminal-based network packet analyzer (Wireshark CLI)mraptorDetects malicious macros in Office documentsoledumpParses OLE files and embedded streamsoleidIdentifies features in OLE files that may indicate threatsolevbaExtracts and analyzes VBA macros from Office filesrtfobjExtracts embedded objects from RTF documentszipdumpInspects contents of ZIP files, including suspicious payloadspdf-parserAnalyzes structure and contents of suspicious PDFsFLOSSReveals obfuscated and decoded strings in binariesclamscanOn-demand virus scanner using ClamAV enginestringsExtracts printable strings from binary filesYARA-XNext-generation high-performance YARA rule scannerIf you only need a subset of tools you can easily save and restore that a custom profile.
TShark Panel with Built-In Reference
Tshark and the integrated field referenceA new TShark integration exposes features including:
- A filter builder panel
- Commonly used fields reference
- Tooltip hints for each example (e.g., `ip.addr == 192.168.1.1` shows โAny traffic to or from 192.168.1.1โ)
- One-click copy support
This helps analysts build and understand filters quicklyโeven if TShark isnโt something they use every day. Using the syntax builder in MalChela you can use the exact commands directly in Tshark or Wireshark.
YARA-X Support (Install Guide Included)
YARA-X module in MalChelaSupport for YARA-X (via the `yr` binary) is now built in. YARA-X is not bundled with REMnux by default, but install instructions are included in the User Guide for both macOS and Linux users.
Once installed, MalChela allows for rule-based scanning from the GUI,and with YARA-X, itโs faster than ever.
fileanalyzer: Fuzzy Hashing, PE Metadata, and More
Updated FileAnalyzer ModuleMalChelaโs fileanalyzer tool has also been updated to include:
- Fuzzy hashing support via `ssdeep`
- BLAKE3 hashing for fast, secure fingerprints
- Expanded PE analysis, including:
- Import and Export Table parsing (list of imported and exported functions)
- Compilation Timestamp (for detection of suspicious or forged build times)
- Section Characteristics (flags like IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, etc., for detecting anomalous sections)
These improvements provide deeper insight into executable structure, helping analysts detect anomalies such as packers, suspicious timestamps, or unexpected imports/exports. Useful for everything from sample triage to correlation, fileanalyzer now digs deeperโwithout slowing down.
Memory Forensics Gets a Boost: Volatility 3 Now Supported
With the 2.2 release, MalChela introduces support for Volatility 3, the modern Python-based memory forensics framework. Whether youโre running MalChela in REMnux or on a customized macOS or Linux setup, you can now access the full power of Volatility directly from the MalChela GUI.
Volatility 3 in MalChelaThereโs an intuitive plugin selector that dynamically adjusts available arguments based on your chosen plugin,. You can search, sort, and browse available plugins, and even toggle output options like โdump-dir with ease.
Like Tshark, there is an added plugin reference panel with searchable descriptions and argument overviews โ a real time-saver when navigating Volatilityโs deep and often complex toolset.
Volatility Plugin ReferenceSmarter Tool Configuration via YAML
The tool configuration system continues to evolve:
- Tools now declare their input type (file, folder, or hash)
- The GUI dynamically adjusts the interface to match
- Alternate profiles (like REMnux setups) can be managed simply by swapping `tools.yaml` files via the GUI
- Easily backup or restore your custom setups
- Restore the default toolset to get back to basics
This structure helps keep things cleanโwhether youโre testing, teaching, or deploying in a lab environment.
Embedded Documentation Access
The GUI now includes a link to the full MalChela User Guide in PDF. You can also access the documentation online.
From tool usage and CLI flags to configuration tips and install steps, itโs all just a click awayโespecially useful in offline environments or when onboarding new analysts. Iโll be honest, this is likely the most comprehensive user guide Iโve ever written.
Whether youโre reviewing binaries, building hash sets, or exploring network capturesโMalChela 2.2 is designed bring together the tools you need, and make it easier to interoperate between them.
The new REMnux mode makes it even easier to get up and running with dozens of third party integrations.
Have an idea for a feature or application youโd like to see supported โ reach out to me.
GitHub: REMnux Release
MalChela User Guide: Online, PDF, Web
Shop: T-shirts, hats, stickers, and more
#DFIR #Github #MalChela #Malware #MalwareAnalysis #Memory #Network #NSRL #PCAP #Python #REMnux #Rust #Tshark #VirusTotal #Volatility #yara
-
With our team at Stratosphere Laboratory AIC FEE CTU, we are organising this year's Honeynet Project Workshop 2025 in Prague!
It will be a unique space to share your passion for deception technologies, honeypots, and cybersecurity with industry leaders and fellow researchers!
๐ We are looking for sponsors who want to support deception research!
๐ Early birds are still open until April 29th! Grab your tickets!
๐ Last days to submit your training and talks proposals!
๐ Students can apply for a Cรฉdric Blancher Memorial Scholarship!This is the first time the conference is coming to Prague, with previous editions hosted in Copenhagen (2024), Innsbruck (2019), Taipei (2018), Canberra (2017), San Antonio (2016), Stavanger (2015), Warsaw (2014), Dubai (2013), San Francisco (2012), Paris (2011), Mexico City (2010) and Kuala Lumpur (2009).
What a unique opportunity!
๐ https://prague2025.honeynet.org/
Boost and help us spread the word! ๐พ
#honeynet #cybersecurity #deception #honeypots #infosec #prague #praguetoday #SecurityConference #ThreatIntel #MalwareAnalysis #PragueEvents
-
Inside the Mind of a Hacker #CyberSecurity #HackerMindset #DigitalDefense #InfoSec #CyberThreats #TTPs #PhishingAwareness #PrivilegeEscalation #NetworkSecurity #MalwareAnalysis #EthicalHacking #OpSec #BlueTeam #RedTeam #CyberIntel #DeadSwitch #CyberGhost #KnowYourEnemy #SilenceIsTactical #FearTheSwitch
http://tomsitcafe.com/2025/04/08/inside-the-mind-of-a-hacker/
-
For hobbyist Cobalt Strike Beacon collectors, note that the recently announced 4.11 update introduces a number of changes to frustrate Beacon configuration extraction, namely through the new `transform-obfuscate` field.
When set, this field can apply multiple layers of encoding, encryption and compression (with some recent Beacons observed with a 32 byte XOR key, configurable upto 2048 bytes!).
While still reasonably trivial to decode manually, standard automated workflows (say, through the SentinelOne parser) will now fail, not least because of changes to the well-known field markers.
Beacons with these characteristics have thus far been observed with watermarks indicative of licensed instances, though I imagine it is only a matter of time before the 4.11 capabilities become accessible to all manner of miscreants.
A sample configuration, via a staged Beacon on 104.42.26[.]200 is attached, including the three distinct XOR keys used to decode it.
https://www.cobaltstrike.com/blog/cobalt-strike-411-shh-beacon-is-sleeping
-
Hello everyone.
In today's article we are examining 30 Cyber โโSecurity Projects with Python.I wish everyone good work:
https://denizhalil.com/2025/01/24/30-cybersecurity-projects-with-python/#ethicalhacking #cybersecurity #learnpython #pythonprojects #networksecurity #malwareanalysis #pythonprogramming
-
Hello everyone.
In today's article we are examining 30 Cyber โโSecurity Projects with Python.I wish everyone good work:
https://denizhalil.com/2025/01/24/30-cybersecurity-projects-with-python/#ethicalhacking #cybersecurity #learnpython #pythonprojects #networksecurity #malwareanalysis #pythonprogramming
-
Hello everyone.
In today's article we are examining 30 Cyber โโSecurity Projects with Python.I wish everyone good work:
https://denizhalil.com/2025/01/24/30-cybersecurity-projects-with-python/#ethicalhacking #cybersecurity #learnpython #pythonprojects #networksecurity #malwareanalysis #pythonprogramming
-
Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft https://gbhackers.com/solana-malware-data-theft/ #Cryptocurrencyhack #CyberSecurityNews #DataExfiltration #Malwareanalysis #CryptoSecurity #Malware
-
The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:
https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/
I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.
Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).
Have a great day.
#windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis
-
The nineth article (38 pages) of the Malware Analysis Series (MAS) is available on:
https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/
I would like to thank Ilfak Guilfanov @ilfak and @HexRaysSA (on X) for their constant and uninterrupted support, which have helped me write these articles.
Even though I haven't been on this subject for years, I promised I would write a series of ten articles, and the last one will be released next week (JAN/15).
Have a great day.
#windows #shellcode #malware #reverseengineering #reversing #idapro #malwareanalysis
-
PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner https://gbhackers.com/php-vulnerability-packetcrypt-mining/ #cryptocurrencymining #Cryptocurrencyhack #CVE/vulnerability #CyberSecurityNews #Malwareanalysis #cybersecurity
-
Weaponized Python Scripts Deliver New SwaetRAT Malware https://gbhackers.com/swaetrat-python-malware/ #CyberSecurityNews #Malwareanalysis #cybersecurity #PythonMalware #Malware #Python
-
LABORATORIOS GRATUITOS PARA PONER A PRUEBA TUS HABILIDADES DE REDTEAM-BLUETEAM y CTF
ยท Ataque-Defensa - https://attackdefense.com
ยท Alerta para ganar - https://alf.nu/alert1
ยท Bangkok - https://bancocn.com
ยท CTF Komodo Seguridad - https://ctf.komodosec.com
ยท CryptoHack - https://cryptohack.org/
ยท Desafรญo CMD - https://cmdchallenge.com
ยท Explotaciรณn educativa - https://exploit.education
ยท Google CTF - https://lnkd.in/e46drbz8
ยท HackTheBox - https://www.hackthebox.com
ยท Hackthis - https://www.hackthis.co.uk
ยท Hacksplaining - https://lnkd.in/eAB5CSTA
ยท Hacker101 - https://ctf.hacker101.com
ยท Hacker de seguridad - https://lnkd.in/ex7R-C-e
ยท Hacking-Lab - https://hacking-lab.com/
ยท HSTRIKE - https://hstrike.com
ยท ImmersiveLabs - https://immersivelabs.com
ยท Concurso de novatos - https://lnkd.in/ewBk6fU5
ยท OverTheWire - http://overthewire.org
ยท Laboratorios Prรกcticos Pentest - https://lnkd.in/esq9Yuv5
ยท Pentestlab - https://pentesterlab.com
ยท Hackaflag BR - https://hackaflag.com.br/
ยท Laboratorios de prรกctica de pruebas de penetraciรณn - https://lnkd.in/e6wVANYd
ยท PentestIT LAB - https://lab.pentestit.ru
ยท PicoCTF - https://picoctf.com
ยท PWNABLE - https://lnkd.in/eMEwBJzn
ยท Root-Me - https://www.root-me.org
ยท Root en la cรกrcel - http://rootinjail.com
ยท SANS Challenger - https://lnkd.in/e5TAMawK
ยท SmashTheStack - https://lnkd.in/eVn9rP9p
ยท Los desafรญos de Cryptopals Crypto - https://cryptopals.com
ยท Prueba Hack Me - https://tryhackme.com
ยท Vulnhub - https://www.vulnhub.com
ยท W3Challs - https://w3challs.com
ยท WeChall - http://www.wechall.net
ยท Zenk-Seguridad - https://lnkd.in/ewJ5rNx2
ยท Ciberdefensores - https://lnkd.in/dVcmjEw8
ยท TrytoHackme - www.tryhackme.com Vรญa : Unai Rubio en LinkedIn. #Ciberseguridad #Cybersecurity #CTF #RedTeam #BlueTeam
#Hacking #Pentesting #Infosec #EthicalHacking #CyberDefense
#CyberSkills #CaptureTheFlag #SecurityAwareness
#VulnerabilityAssessment #ThreatHunting #MalwareAnalysis
#IncidentResponse #CyberTraining