解析メモ

マルウェア解析してみたり解析に役に立ちそうと思ったことをメモする場所。このサイトはGoogle Analyticsを利用しています。

4n6 Week 6 – 2023 - SOFTWARE UPDATES

本エントリは This Week in 4n6 (FourAndSix=Forensics) で紹介された各記事の冒頭を表示し、チェックする記事をザッピングするために自動生成&投稿したものです。4n6 は こちら からご確認いただけます。

SOFTWARE UPDATES

John Lukach at 4n6ir

by John Lukach Released lucky number version 13 recently to help anyone and everyone triage their Amazon Linux, Amazon Linux 2, and Amazon Linux 2022 installations for x86_64 and arm64 architectures. //github.com/jblukach/mmi The corpus includes 288 images from us-west-2, a.k.a. Oregon, with a correlation to 27 regions for potentially 7,776 Amazon Machine Image (AMI) coverage. //matchmeta.4n6ir.com New Dection GTFOBins is a curated list of Unix binaries that can bypass local security restriction...

ANSSI

Skip to content Toggle navigation Sign up Product Actions Automate any workflow Packages Host and manage packages Security Find and fix vulnerabilities Codespaces Instant dev environments Copilot Write better code with AI Code review Manage code changes Issues Plan and track work Discussions Collaborate outside of code Explore All features Documentation GitHub Skills Blog Solutions For Enterprise Teams Startups Education By Solution CI/CD & Automation DevOps DevSecOps Case Studies Customer Stori...

Federico Lagrasta

Latest Latest Compare Choose a tag to compare View all tags last-byte released this 29 Jan 13:35 v1.9.1 420acd8 New bug fixes and detections. Added detections: Power Automate BITS Jobs NotifyCmdLine Screensaver Assets 3 3 people reacted 👍 2 RomelSan and wagga40 reacted with thumbs up emoji ❤️ 1 Dreksis reacted with heart emoji All reactions 👍 2 reactions ❤️ 1 reaction Footer © 2023 GitHub, Inc. Footer navigation Terms Privacy Security Status Docs Contact GitHub Pricing API Training Blog About Yo...

Trevor Borden at InQuest

Posted on 2023-01-31 by Trevor Borden ThreatIngestor is a flexible, configuration-driven, extensible framework for consuming threat intelligence. It can monitor Twitter, RSS feeds, and other sources, extract meaningful information like C2 IPs/domains and YARA signatures, then send that information to other systems for analysis. Use ThreatIngestor alongside ThreatKB or MISP to automate importing public C2s and YARA signatures, or integrate it into your existing workflow with custom operator plugi...

Manabu Niseki

Skip to content Toggle navigation Sign up Product Actions Automate any workflow Packages Host and manage packages Security Find and fix vulnerabilities Codespaces Instant dev environments Copilot Write better code with AI Code review Manage code changes Issues Plan and track work Discussions Collaborate outside of code Explore All features Documentation GitHub Skills Blog Solutions For Enterprise Teams Startups Education By Solution CI/CD & Automation DevOps DevSecOps Case Studies Customer Stori...

MobilEdit

Products All products... MOBILedit Forensic MOBILedit Cloud Forensic Smartwatch Forensics Connection Kit Camera Ballistics MOBILedit Phone Manager Services Trainings Webinars Downloads News Online Store Support User guides Contact us Supported phones Supported apps User Portal License policy Company About Contact us Meet us around the world Our Resellers Resellers area Careers Compelson Products All products... MOBILedit Forensic MOBILedit Cloud Forensic Smartwatch Forensics Connection Kit Camer...

Thiago Canozzo Lahr

Pre-release Pre-release Compare Choose a tag to compare View all tags tclahr released this 02 Feb 11:27 v2.5.0-rc1 073a0a5 Features Added extraction of memory sections and strings from '/proc/[pid]/mem' using the data available in '/proc/[pid]/maps', even if processes are shown up as being (deleted). This functionality is enabled via 'tools/linux_procmemdump.sh' script. Artifacts file: Added a new option to define a custom output file name where the standard error messages (stderr stream) will b...