Ghidra FID generation
Automate .fidb generation with headless Ghidra
https://blog.threatrack.de/2019/09/20/ghidra-fid-generator/
Automate .fidb generation with headless Ghidra
https://blog.threatrack.de/2019/09/20/ghidra-fid-generator/
Forwarded from Web Security | Bug hunting
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
https://github.com/The-Art-of-Hacking/h4cker/
https://github.com/The-Art-of-Hacking/h4cker/
GitHub
GitHub - The-Art-of-Hacking/h4cker: This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources…
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security,...
Double Trouble: RevengeRAT and WSHRAT
https://www.fortinet.com/blog/threat-research/malware-analysis-revenge-rat-sample.html
https://www.fortinet.com/blog/threat-research/malware-analysis-revenge-rat-sample.html
Various public documents, whitepapers and articles about APT campaigns
https://github.com/kbandla/APTnotes
https://github.com/kbandla/APTnotes
GitHub
GitHub - kbandla/APTnotes: Various public documents, whitepapers and articles about APT campaigns
Various public documents, whitepapers and articles about APT campaigns - kbandla/APTnotes
Standard Windows processes: a brief reference
https://www.andreafortuna.org/2017/06/15/standard-windows-processes-a-brief-reference/
https://www.andreafortuna.org/2017/06/15/standard-windows-processes-a-brief-reference/
Andrea Fortuna
Standard Windows processes: a brief reference
Useful in forensics analysis and incident response During the analysis phase, after (for example) a system compromization, is very important to know the standard Windows processes, in order to have a ‘baseline’ useful to make a ‘diff’ with the compromised…