Malware analysis tools are highly essential for Security Professionals who always need to learn many tools, techniques, and concepts to analyze sophisticated...
Before hunting malware, every researcher needs to find a system where to analyze it. There are several ways to do it: build...
The fight against malware has taken another angle. Cybersecurity experts found a way to detect reused malware, improving malware analysis. In this...
Remote access Trojans (RATs) are one of the most popular hacking tools, as they allow attackers to remotely control a compromised system....
Certified Malware Analyst: In 2020, sophisticated Cyber attacks keep on increasing by APT threats that target most of the enterprise-level networks and...
Attack Monitor is Python application written to enhance security monitoring capabilites of Windows 7/2008 (and all later versions) workstations/servers and to automate...
Analysing the malware to breakdown its function and infection routine is a kind of tough job. here we describing the complete Malware...
What is malware analysis? This is the process involved in studying and learning how a particular malware works and what it can...
Cybercriminals execute malware attacks using different attack vectors and using different methods. The number of malware strains is increasing in an unprecedented...
Malware Analysis: An Introduction Cybercriminals are turning more sophisticated and innovative, new and advanced varieties of malware are coming up and malware...
Malboxes is a tool to streamline and simplify the creation and management of virtual machines used for malware analysis. Building analysis machines...
Looking for an automated malware analysis software? Something like a 1-click solution that doesn’t require any installation or configuration…a platform that...
BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis. BlobRunner allocates memory for the target file and jumps...
CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files. CuckooDroid brigs to cuckoo the...
There are plenty of tools for behavioral malware analysis. The defacto standard ones, though, are Sysinternals’s Process Monitor (also known as Procmon)...
Droidefense (originally named atom: analysis through observation machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security...
PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly...
Canada’s Communications Security Establishment (CSE) intel agency has released the source code for one of its malware analysis tools dubbed Assemblyline. The...
I’m proud to share with you the first report produced by Z-Lab, the Malware Lab launched by the company CSE CybSec. Enjoy...
FLARE VM is the first of its kind freely available and open sourced Windows-based security distribution designed for reverse engineers, malware analysts,...
A large number of computer intrusions involve some form of malicious software (malware), which finds its way to the victim’s workstation or...