-
* Research the software and OS's being used on the network that was targeted by the APT 32: Operation Cobalt Kitty
* Research the malware used to compromise the victim network
* Research the manage…
-
**Is your feature request related to a problem? Please describe.**
When analyzing hundreds or thousands of binary traits, it becomes time-consuming to manually classify and identify relevant patterns…
-
**Background**
This is our first Malware Static Analyzer written in RUST.
Static analysis is a well research topic, where recurrently Researches are able to achieve 95-97% detection using a series o…
-
**Issue**
“sanitycheckcpp.exe” is detected as malware by Kaspersky Antivirus.
(note that I use CLion IDE)
**To Reproduce**
- Launch CLion IDE
- Create a C++ Meson project
**System paramete…
-
Since of most of us would be doing home office, is there any plan to revive this project?
An open source tool will help immensely in research against malware that will try to use this name. There alr…
-
https://joddiy.github.io/blog/2018/12/18/dynamic-malware-research/
This post summaries 8 papers on dynamic malware detection domain.
-
https://www.virustotal.com/gui/file/ebf1778f0a6febd79f94bd4ba691df6d0fcef8d97aef74bfcda9544ed0d7b143
![image](https://github.com/user-attachments/assets/20acf7ac-d669-4e44-b79c-17a78c93d9ba)
💀
ian4u updated
3 weeks ago
-
This is a tracking issue for all the steps related to a document sanitization (aka content disarmament/reconstruction, aka malware mitigation) workflow.
The goal is a workflow that allows users to …
-
I had tested out if a non contact user intiated various stages of media attachments including voice recordings. I had found that Signal does not process media attachments except stickers. Theoreticall…
-
Possible design goals
- Detectable malware
- Stealthy malware
- APT-like malware
- Design undetectable malware
Use cases
- Reverse obfuscated or otherwise stealthy malware
- Detect malware by traditi…