April 20, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: malware hunting (page 5)

Tag Archives: malware hunting

How To

Hunting with YARA rules and ClamAV

Didier Stevens has published a post about using ClamAV with YARA rules for hunting in NVISO Labs blog. He notes that on…

Software

Simple Static Malware Analyzer

SSMA is a simple malware analyzer written in Python 3. The tool has the following features: Analyze PE file’s header a…

How To

Hardening Win7 x64 on VirtualBox for Malware Analysis

Byte Atlas has published an interesting post on how to create and configure Windows 7 x64 virtual machine in VitrualBox for …

How To

Running Executables on macOS From Memory

Stephanie Archibald from Cylance has written an article about the execution of multi-stage payloads on Mac OS X (up to Sierr…

Software

Analyze the boot records used by BIOS based systems with bootcode_parser

bootcode_parser.py is a Python script designed to perform a quick offline analysis of the boot records used by BIOS based sy…

Articles

Principles of Android Malware Detection

In this article, we are dealing with the main principles of the detection and analysis of the Android operating system malwa…

Software

Noriben – Portable, Simple, Malware Analysis Sandbox

Noriben is a Python-based script by Brian Baskin that works in conjunction with Sysinternals Procmon to automatically c…

Webinars

Live Forensics & Memory Analysis

So you think you might have a compromised Windows system. If you do, where do you start? How would you review the memory of …

How To

LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis

Dynamic-analysis techniques have become the linchpins of modern malware analysis. However, software-based methods have been …

How To

Memory Forensics of Linux and Mac Systems

Here is Andrew Case’ presentation on memory forensics of Linux and Mac systems from Enfuse 2016. …

Page 5 of 6First...23456

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account