-
Recent Posts
Categories
- Academia (21)
- Android (1)
- Anti-Forensics (2)
- AntiX (4)
- Apache/Tomcat (8)
- Arabnix (6)
- BackTrack (5)
- Books (17)
- C5W (1)
- Challenges (5)
- Companies (16)
- Conferences (1)
- Cyber 5W (2)
- Database (23)
- Development (31)
- DFIR (14)
- Exploitation (8)
- File Systems (1)
- Firewalls (20)
- Footprinting (14)
- Forensics (22)
- Fun (28)
- GNU/Linux (101)
- HDFS (1)
- IDS/IPS (4)
- Investigations (13)
- Kernel (24)
- Life (161)
- Linux Security (68)
- Linux Services (37)
- Malware (9)
- Memory (1)
- Metasploit (6)
- Mobile (3)
- Networks (44)
- News (75)
- OSINT (6)
- Patch Management (5)
- PCI Compliance (8)
- PenTest (52)
- Poems (9)
- PortKnocking (10)
- Privacy (4)
- Publications (12)
- Real Madrid (17)
- Research (6)
- Security (84)
- Snippets (33)
- Social Engineering (4)
- Software/Tools (53)
- Sport (78)
- ThreatHunting (4)
- Unix (12)
- Virtualization (27)
- Vulnerability (7)
- Web Security (12)
- Webapp (4)
- WHM/Cpanel (6)
- Windows (19)
- Workshops (2)
- z0ne (16)
Archives
Category Archives: Software/Tools
Malware Tools, Tips and Tricks
In the past, I used to maintain a Google Doc with all the tools I use or recommend for my students to use for Malware Analysis. A couple of days ago, while doing a Malware Analysis workshop for NW3C, I … Continue reading
Posted in Academia, AntiX, DFIR, Investigations, Malware, Research, Software/Tools
Tagged Malware Analysis, Tips, Tools, Tricks
Comments Off on Malware Tools, Tips and Tricks
Windows Sandbox Scripts
Windows Sandbox is an amazing Windows feature that could be used for Malware Analysis. In order to install it you’ll need to follow this blog post here by Microsoft.
Posted in DFIR, Investigations, Malware, Research, Security, Software/Tools, ThreatHunting, Virtualization, Windows
Tagged Malware Analysis, Reverse Engineering, Windows Sandbox
Comments Off on Windows Sandbox Scripts
Acquiring Linux Memory using AVML and Using it with Volatility
This is another quick post going over the process to acquire memory from a Linux system, but instead of using LiME, I’m going to use AVML which stands for Acquire Volatile Memory for Linux, and could be found here. The … Continue reading
Posted in DFIR, Forensics, Memory, Software/Tools
Tagged Acquiring, avml, Forensics, LiME, Linux, memory forensics, Profile, Volatility
Comments Off on Acquiring Linux Memory using AVML and Using it with Volatility
سكربت بسيط لعمل ARP Spoofing
سكربت بسيط لعمل ARP Spoofing … قم بنسخ الكود وتشغيله او تحميله من صفحة المشاريع (هنا) … #!/usr/bin/env python import sys, time from scapy.all import sendp, ARP, Ether if len (sys.argv) < 4: print "Usage\n:" print sys.argv[0] + " " … Continue reading
Posted in Development, PenTest, Software/Tools
Tagged ARP, ARP-Poisoner, ARP-Spoofing, Poison, Python, Scapy, Spoof, Spoofing
Comments Off on سكربت بسيط لعمل ARP Spoofing
ما بعد تنصيب Debian 6 Squeeze
بالنسبة لي بعد أن قمت بتنصيب التوزيعة قمت بإضافة المستودعات التي أحتاجها … وبالنسبة لي هذه هي المستودعات التي أفضلها بصراحة … غيري لربما يفضل مستودعات آخرى لكن أنا أستعمل المستودعات التالية: قم بتحميلها من هنا … بعد ذلك كل … Continue reading