-
### Finding Description
At least one key that was used to sign the app is too short to be considered secure.
The application was signed using a key length less than or equal to 1024 bits, making it …
-
## Use case
A common question is "what samples of do we have?" - this enables threat hunting, and proper tracking of malware samples.
The proper way to create a relationship between a sample an…
-
From @alexcpsec in #21:
> I would separate the enrichments by "groups" (for the lack of a better name) in a config file. And the groups would have a list of the sources that would be harvested by the…
-
I'm trying to replicate your results, but all the codebase is in python2 and pydasm also would need python2 support to run.
Will you support python3?
Thank you in advance!
-
### The scenario
I have a physical box (for malware) on a localnet, and a cuckoo installation
on another box that also acts as a router for the physical box.
I also have multiple VPN interfaces…
-
Is this legit, or is this just google doing google things because they're losing revenue due to this
-
FairPlaySocial already has a small feature to deny creating posts with Forbidden Urls.
There is a table "ForbiddenUrl" and a class "ForbiddenUrlService".
The urls must be the shortest form of the ur…
-
```
http://code.google.com/intl/fi-FI/projecthosting/policy.html
You are violating code.google.com service policy by hosting malicious products.
Please remove this project from code.google.com.
I h…
-
Something that makes me nervous about this app is that people can install plugins - and I can't guarantee they won't end up installing a malicious plugin that runs malware or steals data or similar.
…
-
I am running version 1..3.5b both in client and server instances as we have not had the opportunity to do a server update to 1.3.5.3
Everything has been working fine until this morning, however, wh…