There are many useful tutorials here @reversecodeengineering
We've a group now, feel free to start sharing and discussing any topic that is RE related.
@reverseengineeringxx
@reverseengineeringxx
command-and-control server (C&C server)
https://whatis.techtarget.com/definition/command-and-control-server-CC-server
https://whatis.techtarget.com/definition/command-and-control-server-CC-server
Trickbot Password Grabber Module
https://blog.trendmicro.com/trendlabs-security-intelligence/trickbot-shows-off-new-trick-password-grabber-module/
https://blog.trendmicro.com/trendlabs-security-intelligence/trickbot-shows-off-new-trick-password-grabber-module/
https://blog.malwarebytes.com/threat-analysis/2018/05/malware-analysis-decoding-emotet-part-1/
https://blog.malwarebytes.com/threat-analysis/2018/06/malware-analysis-decoding-emotet-part-2/
https://blog.malwarebytes.com/threat-analysis/2018/06/malware-analysis-decoding-emotet-part-2/
Malwarebytes
Malware analysis: decoding Emotet, part 1
Emotet Banking Trojan malware has been around for quite some time now. As such, infosec researchers have made several attempts to...
Enable Microsoft PDB support in Ghidra without installing Visual Studio 2017
https://t.co/KXqS52JKxe
https://t.co/KXqS52JKxe
GitHub
GitHub - MalwareTech/MSDIA-x64: Enable Microsoft PDB support in Ghidra without installing Visual Studio
Enable Microsoft PDB support in Ghidra without installing Visual Studio - MalwareTech/MSDIA-x64