April 23, 2021

Cyber Forensicator

  • Articles
  • Books
  • Contact
  • How To
  • News
  • Presentations
  • Science
  • Software
  • Tips & Tricks
  • Videos
  • Webinars
  • White Papers
Home Tag Archives: malware hunting (page 6)

Tag Archives: malware hunting

How To

Practical OS X Malware Detection and Analysis

Here is Patrick Wardle’s presentation from RSA Conference USA 2016 on practical OS X malware detection and analysis. …

Tips & Tricks

Using OS X FSEvents to Discover Deleted Malicious Artifacts

Here is an article by William Tan describing the usage of OS X FSEvents to discover deleted malicious artifacts. …

News

Happy New Year!

We would like to thank everyone who was reading our blog this year, keep inspiring us and we promise to provide you with the…

How To

Volatility on Ubuntu on Windows 10

Joshua Trombley has published a useful tutorial in his OpenSec Labs blog on how to install Volatility on Ubuntu on Wind…

How To

Detect Known Malware from Memory Images with Impfuzzy for Volatility

Impfuzzy for Volatility is a tool created by JPCERT/CC, which can be used for extracting known malware from memory imag…

Software

PCAP_tools: A Plugin for ProcDOT

ProcDOT is a malware analysis tool created by Christian Wojner. …

How To

Identifying Malware from a Memory Capture

If you are interested in memory forensics, and especially in identifying malware in memory dumps, this post by Adam Bri…

How To

Malware Analysis with Wine

Adam from Hexacorn has published an interesting post about using Wine for malware analysis. …

Webinars

Live Analysis of a Process Hollowing

Join speaker, Justin Seitz, the author of books “Black Hat Python” & “Grey Hat Python”, Malware …

Page 6 of 6First...23456

Follow Us

About Us

Cyber Forensicator is a web-project by Igor Mikhaylov and Oleg Skulkin aiming on collecting all most interesting and important cyber and digital forensics news, articles, presentations, and so on, in one place.

Popular Posts

Open Sourcing JA3: SSL/TLS Client Fingerprinting for Malware Detection

October 20, 2017

Cloud Forensics: Analyzing MEGASync

April 15, 2018

Windows Phone Physical Imaging Without JTAG and Chip-off

June 3, 2018

Timeline

  • March 4, 2021

    Find out what happened during a ransomware attack on computer

  • January 24, 2021

    Analyzing videos with multiple video streams in digital forensics

  • December 19, 2020

    PC3000 Portable III in Digital Forensics

  • December 18, 2020

    How to analyze different types of devices and find connections between them

  • July 5, 2020

    Threat Hunting: What it Is, and What it Is Not

CyberForensicator.com © Copyright 2016-2021, All Rights Reserved

Login

Welcome!Log into your account