• Home
  • Tools
    • Malybuzz
    • peepdf
  • Pub
    • Advisories
    • Exploits
    • Articles
    • Presentations
  • Var
    • Scripts
  • About
Home » Tags

Tags

Analysis BackTrack RedKit Presentations Privacy PDF Reversing Exploiting Feodo Vulnerabilities PoC Android Spyeye Specifications NFC Exploits Gameover Botnet Security Black Hat Exploit kits Mobile Challenge Python Social Networking Conferences Malcode peepdf Detection Workshop Citadel Tools e-crime Tatanga Javascript Andromeda MitB Antivirus Malware Zlib Fraud Advisories MitMo Scripts Streams BlackHole RFID Banks DoS SmokeLoader Twitter Credit cards Malybuzz PN532 Shellcode Spam ZeuS-P2P ZeuS Botnets Research
Syndicate content
Follow me on twitter!!
Malcode Analysis Spam Tools Exploit kits Challenge Vulnerabilities Conferences Botnets Security Shellcode Python Exploits Research peepdf Malware Javascript Specifications Citadel Scripts Black Hat Fraud ZeuS Botnet Mobile NFC Feodo Reversing PDF Tatanga
more tags

Latest blog posts

  • Dridex spam campaign using PDF as infection vector
  • Adding a scoring system in peepdf
  • Travelling to the far side of Andromeda at Botconf 2015
  • Black Hat Arsenal peepdf challenge solution
  • Black Hat Arsenal peepdf challenge
  • peepdf news: GitHub, Google Summer of Code and Black Hat
  • Andromeda/Gamarue bot loves JSON too (new versions details)
  • Quick analysis of the CVE-2013-2729 obfuscated exploits
  • Dissecting SmokeLoader (or Yulia's sweet ass proposition)
  • Released peepdf v0.3
more

Security Posts

  • Infocon: green
  • Predictive Policing Software Terrible at Predicting Crimes
  • ISC Stormcast For Monday, October 2nd, 2023 https://isc.sans.edu/podcastdetail/8682, (Mon, Oct 2nd)
  • AT&T Cybersecurity: championing global cybersecurity education & awareness
  • Friendly Reminder: ZIP Metadata is Not Encrypted, (Mon, Oct 2nd)
  • 4, 5 y 6 de Octubre: Navaja Negra, II Forum Europeo de IA & Horizonte
  • Update: xor-kpa.py Version 0.0.8
  • Update: simple_listener.py Version 0.1.3
  • Overview of Content Published in September
  • Update on Naked Security
  • Pitfalls of relying on eBPF for security monitoring (and some solutions)
  • From ERMAC to Hook: Investigating the technical differences between two Android malware variants
  • Building a Cyber Resilient Business: The Protection Layer
  • How Easy is Email Encryption? You’d Be Surprised.
more