2013-01-01から1年間の記事一覧

FREE Security Training

sec

Home Page - www.SecurityXploded.com

[forensics] Memory Forensics (Windows,Mac and Linux)

sec

2010 2013 sandro suffert memory forensics introdutory work shop - pub…

[malware] Malware-Analyzer.com

sec

Malware-Analyzer.com is your solution to malware analysis tools, resources, and discounted malware reverse engineer training. Malware-Analyzer.com has a variety of tools from automated analysis to memory forensics. If you have a malware an…

[decode] [malware] UnBup - McAfee BUP Extractor for Linux

sec

Open Security Research: UnBup - McAfee BUP Extractor for Linux

PE-bear

sec

PE-bear | hasherezade's 1001 nights

PeStudio

sec

winitor

PyKd - Python extension to access Debug Engine

sec

Python extension for WinDbg Python extension for WinDbg - Home

the PE analysis toolkit

sec

pev download | SourceForge.net]

PEV PE ANALYSIS TOOLKIT

sec

Reversing PE executable files require a special tools because the payload that may contain the malware in PE files is packed inside another executable file that can be a legitimate. This makes a standard static analyses tool wont be able t…

【要注意】 玄関の「U字ロック」はひもで簡単に開けられるらしい  強姦目的で解錠し侵入した男「方法はネットで調べた」 (動画あり)

sec

【要注意】 玄関の「U字ロック」はひもで簡単に開けられるらしい 強姦目的で解錠し侵入した男「方法はネットで調べた」 (動画あり) | ニュース2ちゃんねる

Penetration Test Report

sec

offensive-security http://www.offensive-security.com/reports/penetration-testing-sample-report-2013.pdf

Malware Analysis: The State of Java Reversing Tools

sec

obfuscation Ghetto Forensics: Malware Analysis: The State of Java Reversing Tools

Mount shadow volumes on disk images

sec

Mount shadow volumes on disk images - ForensicsWiki

ShadowKit

Volume Shadow Copy forensic RRTX Blog: ShadowKit - Working with Disk Images

[malware] VirtualKD

VirtualKD is a tool that improves your kernel debugging performance with VMWare and VirtualBox. VirtualKD - Windows Kernel Debugger Booster for Virtual Machines

[forensics] Dropbox Forensics

Dropbox Forensics | Forensic Focus - Articles

metasploitable-linux-2.0.0

sec

Metasploitable is an intentionally vulnerable Linux virtual machine Metasploitable - Browse /Metasploitable2 at SourceForge.net

tree-cbass

sec

Taint-enabled Reverse Engineering Environment on top of a Cross-platform Binary Symbolic execution System tree-cbass - Taint-enabled Reverse Engineering Environment on top of a Cross-platform Binary Symbolic execution System - Google Proje…

ostinato

sec

Packet/Traffic Generator and Analyzer Ostinato

CanSecWest slide

sec

CanSecWest Applied Security Conference: Vancouver, British Columbia, Canada

[malware] APT1: technical backstage

sec

http://www.malware.lu/Pro/RAP002_APT1_Technical_backstage.1.0.pdf

Getting Started with Linux Memory Forensics

sec

SANS Digital Forensics and Incident Response Blog | Getting Started with Linux Memory Forensics | SANS Institute

NTFS Documentation

http://dubeyko.com/development/FileSystems/NTFS/ntfsdoc.pdf

Using Google.com to find Usernames and Passwords

sec

http://backtrack-page.blogspot.com/2013/07/facebook-easy-using-googlecom-to-find.html

[md5] [crack]Best sites that crack MD5 hashes

sec

http://backtrack-page.blogspot.com/2013/07/best-sites-that-crack-md5-hashes.html http://www.tmto.org http://md5.noisette.ch http://md5decryption.com http://www.c0llision.net http://www.netmd5crack.com http://www.md5decrypter.com http://md5…

[forensic] NTDS.DIT Forensics

sec

http://www.ntdsxtract.com/downloads/ntdsxtract/ntds_forensics.pdf

[vagrant] [自動] Vagrantで簡単仮想マシン構築

これは楽だな。。 Vagrantで簡単仮想マシン構築 | Ryuzee.com

[malware] The Citadel crimeware kit - under the microscope

sec

The Citadel crimeware kit – under the microscope | Naked Security

[malware] Citadel Trojan Malware Analysis

sec

http://botnetlegalnotice.com/citadel/files/Patel_Decl_Ex20.pdf

Revelo

sec

Deobfuscate Javascript Tools | Kahu Security Deobfuscating Javascript with Revelo | Kahu Security