Reverse Engineering – Telegram
Reverse Engineering
4.75K subscribers
106 photos
1 video
18 files
458 links
Everything is open-source.

The official community group: @reverseengineeringz
Download Telegram
Ghidra 9.2 has been released!
This version has improvements to analysis, the user interface, new open source based graphing, decompiler quality enhancements, and more!

https://ghidra-sre.org/
Malware Capabilities

Starting with version 4.1, MAEC offers a standard way of capturing the set of high-level abilities that a malware instance possesses, which we term Capabilities. For instance, to state that a malware instance is capable of exfiltrating data, one may simply specify a single MAEC "Data Exfiltration" Capability. We have defined an initial set of Capabilities for the MAEC v4.1 release, which is captured in detail in the hierarchy below.

https://github.com/MAECProject/schemas/wiki/Malware-Capabilities
Malware Behavior Catalog v2.0

The Malware Behavior Catalog (MBC) is a catalog of malware objectives and behaviors, created to support malware analysis-oriented use cases, such as labeling, similarity analysis, and standardized reporting.

https://github.com/MBCProject/mbc-markdown