Posts by Tag

malware

Yara Finder

1 minute read

Yara-Finder A simple tool to yara match the file against various yara rules to find the indicators of suspicion.

Malware Organizer Tool

1 minute read

A simple tool to organise large malicious/benign files into a organised Structure.

Back to top ↑

threat-hunting

Yara Finder

1 minute read

Yara-Finder A simple tool to yara match the file against various yara rules to find the indicators of suspicion.

Malware Organizer Tool

1 minute read

A simple tool to organise large malicious/benign files into a organised Structure.

Back to top ↑

virustotal

Yara Finder

1 minute read

Yara-Finder A simple tool to yara match the file against various yara rules to find the indicators of suspicion.

Malware Organizer Tool

1 minute read

A simple tool to organise large malicious/benign files into a organised Structure.

Back to top ↑

clean files

Malware Organizer Tool

1 minute read

A simple tool to organise large malicious/benign files into a organised Structure.

Back to top ↑

mime-type

Yara Finder

1 minute read

Yara-Finder A simple tool to yara match the file against various yara rules to find the indicators of suspicion.

Malware Organizer Tool

1 minute read

A simple tool to organise large malicious/benign files into a organised Structure.

Back to top ↑

ctf

Back to top ↑

malware-corpus

Malware Organizer Tool

1 minute read

A simple tool to organise large malicious/benign files into a organised Structure.

Back to top ↑

malicious files

Back to top ↑

detection

Back to top ↑

false-positive

Back to top ↑

malware-analysis

Back to top ↑

pdf-parsing

Back to top ↑

pe-executable

Back to top ↑

office-files

Back to top ↑

reverse-engineering

Back to top ↑

libmagic

Back to top ↑

python

Back to top ↑

rar

Back to top ↑

zip

Back to top ↑

mime

Back to top ↑

machine-learning

Back to top ↑

static-analysis

Back to top ↑

dynamic-analysis

Back to top ↑

yara

Yara Finder

1 minute read

Yara-Finder A simple tool to yara match the file against various yara rules to find the indicators of suspicion.

Back to top ↑

university

Back to top ↑

internship

Back to top ↑

adobe

Back to top ↑

security

Back to top ↑

research

Back to top ↑

adobe-internship

Back to top ↑

remote

Back to top ↑

AdobeLife

Back to top ↑

AdobeIntern

Back to top ↑

capture-the-flag

Back to top ↑

hacking

Back to top ↑

cryptography

Back to top ↑

web-security

Back to top ↑

image-forensics

Back to top ↑

Pentesting

Back to top ↑

system-hacking

Back to top ↑

ctf-cheatsheet

Back to top ↑