These are very important guides for understanding the debugging process and how applications work.
Análise de email phishing: "Extrato de pagamento UOL"
This repository contains materials for a hands-on training Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives
Puppy is a lightweight yet strong tool for static investigation of suspicious files. A companion plugin is also provided to query the file in the well-known malware repositories and take one-click technical information about the file such as its size, entropy, attributes, hashes, version info and so on.
Docker containers are the future! It surely seems so from the myriad projects that are being ‘dockerized’! One such cool project is Docker IDA, your answer for large scale reverse engineering, which allows you to run IDA Pro disassembler in Docker containers for automating, scaling and distributing the use of IDAPython scripts.
Olá pessoal, esse post será o primeiro de uma série voltada ao "kali linux" da análise de malware e engenharia reversa, estamos falando do REMNUX. A abordagem vai ser bem simples para facilitar o entendimento, com objetivo de atingir os sysadmin e analistas de segurança que não tem conhecimento em reversing e precisam fazer um assessment de algum RAT, botnet e afins.
List of Android Analysis Tools, generally for facilitate security & malware research. Opening it up to everyone will facilitate a knowledge transfer. Hopefully the initial set will grow and expand.