RSS.Social

cyber.wtf

follow: @[email protected]

Posts

Notes on Pyarmor BCC Mode

.NET Deobfuscation

Unpacking Pyarmor v8+ scripts

Detection of Command and Control Traffic Using Suricata

Harvesting the Database - 5 CVEs in TOPqw Webportal

Destructive IoT Malware Emulation – Part 3 of 3 – Statistics

Parsing Fortinet Binary Firewall Logs

Destructive IoT Malware Emulation – Part 2 of 3 – Hooking Techniques

Give Me Your FortiGate Configuration Backup and I Rule Your Network

Destructive IoT Malware Emulation – Part 1 of 3 – Environment Setup