1. Reverse Engineering >
  2. [r/ECE X-post] Any interest in a bitstream viewer/analysis/processing GUI?

ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

[r/ECE X-post] Any interest in a bitstream viewer/analysis/processing GUI?


Reverse Engineering vom | Direktlink: reddit.com Nachrichten Bewertung

submitted by /u/tuxlovesyou
[link] [comments]...

Externe Webseite mit kompletten Inhalt öffnen



https://www.reddit.com/r/ReverseEngineering/comments/epmctp/rece_xpost_any_interest_in_a_bitstream/

Team Security Social Media

➤ Weitere Beiträge von Team Security | IT Sicherheit

  • SAP GUI bis 7.40 auf Windows SAPlpd Crash Denial of Service

    vom 317.32 Punkte ic_school_black_18dp
    In SAP GUI bis 7.40 auf Windows wurde eine problematische Schwachstelle gefunden. Das betrifft eine unbekannte Funktion der Komponente SAPlpd. Mittels dem Manipulieren mit einer unbekannten Eingabe kann eine Denial of Service-Schwachstelle (Crash) aus
  • Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

    vom 315.6 Punkte ic_school_black_18dp
    Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be
  • Uncovering threat infrastructure via URL, domain and IP address advanced pivots a.k.a. Netloc Intelligence

    vom 278.78 Punkte ic_school_black_18dp
    Quick links:https://support.virustotal.com/hc/en-us/articles/360001387057https://developers.virustotal.com/v3.0/reference#intelligence-searchhttps://github.com/VirusTotal/vt-pyTen years ago, VirusTotal launched VT Intelligence; a critical component of VT Ent
  • Scrounger - Mobile Application Testing Toolkit

    vom 232.2 Punkte ic_school_black_18dp
    Scrounger - a person who borrows from or lives off others. There is no better description for this tool for two main reasons, the first is because this tool takes inspiration from many other tools that have already been published, the second reason is because it lives off mobile application's vulnerabilities. Why Even t
  • Revamping in-house dynamic analysis with VirusTotal Jujubox Sandbox

    vom 229.05 Punkte ic_school_black_18dp
    VirusTotal Jujubox Sandbox in action: This is a small datastudio set up to illustrate the kind of analytics that can be built with a massive dynamic analysis setup, generating IoCs. Note that there are several pages. One of the main themes of VirusTota
  • VirusTotal MultiSandbox += Yoroi: Yomi sandbox

    vom 183.33 Punkte ic_school_black_18dp
    We are excited to welcome Yomi: The Malware Hunter from Yoroi to the mutisandbox project. This brings VirusTotal upl to seven integrated sandboxes, in addition to VT’s own sandboxes for Windows, MacOS, and Android. In their own words: Yomi engine implements a multi-analysis approach able to exploit both
  • VirusTotal multisandbox += VenusEye

    vom 176.34 Punkte ic_school_black_18dp
    VirusTotal multisandbox project welcomes VenusEye. The VenusEye sandbox is currently contributing reports on PE Executables, documents and javascript. In their own words:VenusEye Sandbox, as a core component product of VenusEye Threat Intelligence Center, is
  • DECAF - Short for Dynamic Executable Code Analysis Framework

    vom 167.71 Punkte ic_school_black_18dp
    DECAF++, the new version of DECAF, taint analysis is around 2X faster making it the fastest, to the best of our knowledge, whole-system dynamic taint analysis framework. This results in a much better usability imposing only 4% overhead (SPEC CPU2006)
  • Pipelining VT Intelligence searches and sandbox report lookups via APIv3 to automatically generate indicators of compromise

    vom 167.17 Punkte ic_school_black_18dp
    TL;DR: VirusTotal APIv3 includes an endpoint to retrieve all the dynamic analysis reports for a given file. This article showcases programmatic retrieval of sandbox behaviour reports in order to produce indicators of compromise that you can use to pow
  • Tango down report of OP China ELF DDoS'er

    vom 164.24 Punkte ic_school_black_18dp
    This report is credited to the team work between MMD, CERT and fellow researchers involved. Tango OP Announcement: We are releasing the take-down (Tango OP) project information of our current on-going operation against the ELF DDoS malware, the threat
  • Tango down report of OP China ELF DDoS'er

    vom 164.24 Punkte ic_school_black_18dp
    This report is credited to the team work between MMD, CERT and fellow researchers involved. Tango OP Announcement: We are releasing the take-down (Tango OP) project information of our current on-going operation against the ELF DDoS malware, the threat
  • XSpear v1.3 - Powerfull XSS Scanning And Parameter Analysis Tool

    vom 147.86 Punkte ic_school_black_18dp
    XSpear is XSS Scanner on ruby gemsKey featuresPattern matching based XSS scanningDetect alert confirm prompt event on headless browser (with Selenium)Testing request/response for XSS protection bypass and reflected(or all) paramsReflected ParamsAll params(f

Team Security Diskussion über [r/ECE X-post] Any interest in a bitstream viewer/analysis/processing GUI?