logo
 
  1. Reverse Engineering >
  2. [r/ECE X-post] Any interest in a bitstream viewer/analysis/processing GUI?


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

[r/ECE X-post] Any interest in a bitstream viewer/analysis/processing GUI?


Reverse Engineering vom | Direktlink: reddit.com Nachrichten Bewertung

submitted by /u/tuxlovesyou
[link] [comments]...

https://www.reddit.com/r/ReverseEngineering/comments/epmctp/rece_xpost_any_interest_in_a_bitstream/

Externe Webseite mit kompletten Inhalt öffnen

➤ Ähnliche Beiträge von Team IT Security

  • 1.

    SAP GUI bis 7.40 auf Windows SAPlpd Crash Denial of Service

    vom 341.59 Punkte ic_school_black_18dp
    In SAP GUI bis 7.40 auf Windows wurde eine problematische Schwachstelle gefunden. Das betrifft eine unbekannte Funktion der Komponente SAPlpd. Mittels dem Manipulieren mit einer unbekannten Eingabe kann eine Denial of Service-Schwachstelle (Crash) aus
  • 2.

    Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

    vom 341.47 Punkte ic_school_black_18dp
    Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be
  • 3.

    Scrounger - Mobile Application Testing Toolkit

    vom 248.87 Punkte ic_school_black_18dp
    Scrounger - a person who borrows from or lives off others. There is no better description for this tool for two main reasons, the first is because this tool takes inspiration from many other tools that have already been published, the second reason is because it lives off mobile application's vulnerabilities. Why Even t
  • 4.

    Revamping in-house dynamic analysis with VirusTotal Jujubox Sandbox

    vom 246.29 Punkte ic_school_black_18dp
    VirusTotal Jujubox Sandbox in action: This is a small datastudio set up to illustrate the kind of analytics that can be built with a massive dynamic analysis setup, generating IoCs. Note that there are several pages. One of the main themes of VirusTota
  • 5.

    VirusTotal MultiSandbox += Yoroi: Yomi sandbox

    vom 197.13 Punkte ic_school_black_18dp
    We are excited to welcome Yomi: The Malware Hunter from Yoroi to the mutisandbox project. This brings VirusTotal upl to seven integrated sandboxes, in addition to VT’s own sandboxes for Windows, MacOS, and Android. In their own words: Yomi engine implements a multi-analysis approach able to exploit both
  • 6.

    VirusTotal multisandbox += VenusEye

    vom 189.83 Punkte ic_school_black_18dp
    VirusTotal multisandbox project welcomes VenusEye. The VenusEye sandbox is currently contributing reports on PE Executables, documents and javascript. In their own words:VenusEye Sandbox, as a core component product of VenusEye Threat Intelligence Center, is
  • 7.

    Pipelining VT Intelligence searches and sandbox report lookups via APIv3 to automatically generate indicators of compromise

    vom 181 Punkte ic_school_black_18dp
    TL;DR: VirusTotal APIv3 includes an endpoint to retrieve all the dynamic analysis reports for a given file. This article showcases programmatic retrieval of sandbox behaviour reports in order to produce indicators of compromise that you can use to pow
  • 8.

    DECAF - Short for Dynamic Executable Code Analysis Framework

    vom 179.67 Punkte ic_school_black_18dp
    DECAF++, the new version of DECAF, taint analysis is around 2X faster making it the fastest, to the best of our knowledge, whole-system dynamic taint analysis framework. This results in a much better usability imposing only 4% overhead (SPEC CPU2006)
  • 9.

    Tango down report of OP China ELF DDoS'er

    vom 176.16 Punkte ic_school_black_18dp
    This report is credited to the team work between MMD, CERT and fellow researchers involved. Tango OP Announcement: We are releasing the take-down (Tango OP) project information of our current on-going operation against the ELF DDoS malware, the threat
  • 10.

    Tango down report of OP China ELF DDoS'er

    vom 176.16 Punkte ic_school_black_18dp
    This report is credited to the team work between MMD, CERT and fellow researchers involved. Tango OP Announcement: We are releasing the take-down (Tango OP) project information of our current on-going operation against the ELF DDoS malware, the threat
  • 11.

    XSpear v1.3 - Powerfull XSS Scanning And Parameter Analysis Tool

    vom 159.34 Punkte ic_school_black_18dp
    XSpear is XSS Scanner on ruby gemsKey featuresPattern matching based XSS scanningDetect alert confirm prompt event on headless browser (with Selenium)Testing request/response for XSS protection bypass and reflected(or all) paramsReflected ParamsAll params(f
  • 12.

    Time for VT Enterprise to step up

    vom 150.71 Punkte ic_school_black_18dp
    Late last year we announced the release of VT Enterprise for existing VT Intelligence subscribers. Since the launch, we have iterated on and improved upon VT Enterprise and it is time to begin a full deprecation of the old VT Intelligence interface. Today, we are

Kommentare ber [r/ECE X-post] Any interest in a bitstream viewer/analysis/processing GUI?