We are connected to the digital world that provides us with numerous utilities and entertainment, but sometimes it presents us with undesirable encounters. Online frauds and scams are examples of such encounters. Online scams are not simply at the level of disrupting individuals’ daily lives like mass-marketed commercial spam emails. Scamming…
Category: Interesting Stuff
Wireshark Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffe…
MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the…
Reliable uptime monitoring >> Uptime Robot Website monitoring Be the first to know that your website is down! Cron job monitoring Monitor background jobs or intranet devices. Port monitoring Monitor IMAP, POP3 or any other specific ports. Keyword monitoring Check presence of any text on the page. Pi…
Today’s attackers are taking advantage of changing business dynamics to target people everywhere they work. Staying current on the latest cybersecurity attack vectors and threats is an essential part of securing the enterprise against breaches and compromised data. https://www.proofpoint.com/us/thre…
Reference : Australian Cyber Security Centre The Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC) leads the Australian Government’s efforts to improve cyber security. Our role is to help make Australia the most secure place to connect online. https://www.cyber.gov.au/th…
The primary goal of Malpedia is to provide a resource for rapid identification and actionable context when investigating malware. Openness to curated contributions shall ensure an accountable level of quality in order to foster meaningful and reproducible research. Malware Wikipedia – Click here Thr…
SANS Instructors have built more than 150 open source tools that support your work and help you implement better security. Search the lists on the following pages for the free tools that will help you get the job done. Download PDF file : https://assets.contentstack.io/v3/assets/blt36c2e63521272fdc/…
This tool allows you to search files by reading the contents of a file. Included Features Regular expressions Concurrent multiple file types Recursive directory searching A “context” feature that selects the lines above and below your search expression, or view entire file Most Recently Used li…
If you have anything to do with cyber security, you know it employs its own unique and ever-evolving language. Jargon and acronyms are the enemies of clear writing—and are beloved by cyber security experts. So Morphisec has created a comprehensive cyber security glossary that explains commonly…
Manual analysis of Cobalt Strike Shellcode with Ghidra. Identifying function calls and resolving API hashing.
Leveraging Ghidra to establish context and intent behind imported functions.
Leveraging Ghidra to establish context and intent behind suspicious strings.
Manually Reversing a decryption function using Ghidra, ChatGPT and CyberChef.
Improving Malware Analysis Workflows by Modifying the default Ghidra UI.