threathunter.blogspot.com
Yes I Am Threat Hunter !!!!: July 2015
https://threathunter.blogspot.com/2015_07_01_archive.html
Yes I Am Threat Hunter! Domain:Information Security, Network Security, Hacking, Pentesting and general hacking articles included in the Blog. Friday, July 31, 2015. Windows management instrumentation command. The wmic command to me is one of the more powerful commands on windows. This command is very useful for the anlyst who is performing analysis on windows OS as well as Forensics. This commands helpful to gather information without 3rd party tools. You can do multiple tasks with one command. How To Se...
malformitylabs.com
Partners | MalformityLabs LLC
http://www.malformitylabs.com/partners
Do you or your organization have malware or threat data? Inquire about becoming a partner and you can:. Make your data available in a controlled manner without directly exposing it. Expand your business model by making your data accessible in new ways. Increase your customer base and exposure while creating upsell opportunities. To inquire about becoming a partner, send an email to partners@malformitylabs.com. Leave a Reply Cancel reply. You must be logged in. To post a comment.
govolution.wordpress.com
govolution | About assembler and stuff | Page 2
https://govolution.wordpress.com/page/2
About assembler and stuff. February 6, 2016. Windows Credentials and Memory Dumps – Part 4: Volatility & Mimikatz. For this test I installed everything in a WinXP VM. I followed these instructions:. 8230; with only small changes, because I had a win32 machine. First things first: The plugins seems to be PoC and supports Windows Vista and 7 with 32 and 64 Bit (Maybe works for Win Server 2008 too? Here are the steps for installing volatility with the plugin:. Don’t know if that was really neccessary).
hrazvedka.ru
Чтобы не украли ценное | hrazvedka
http://hrazvedka.ru/category/value
Блог о разведывательных технологиях в бизнесе,. И бизнесе, как разведке. Чтобы не украли ценное. Тем, кто применяет технологии конкурентной разведки для нужд своего бизнеса особенно важно заботиться об информационной безопасности, шифровании файлов и анонимности в сети в рамках законодательства. Можно, конечно, искать решение задач самому. Но лучше положиться на коллективное мнение профессионалов. 8211; торговая площадка для покупки уязвимостей, обнаруженных в различном софте. 8211; Поисковик анализирующ...
909research.com
Toolbox
http://909research.com/toolbox
If you're just getting started in this field, know that half the battle is finding all the tools and understanding what they're best at. Here's my list of the sites I find myself using most and what they're good for:. Website Open Source Intelligence. A nice simple DNS/WhoIs lookup tool. Horrible layout, good info for historical and current DNS records, infrastructure and findings all sites on a given IP. A newcomer, makes a nice graph of subdomains for a given domain. One of the best sources for histori...
volexity.com
Democracy in Hong Kong Under Attack | Volexity Blog
http://www.volexity.com/blog?p=33
Incident Response and Suppression. Democracy in Hong Kong Under Attack. October 9, 2014. Compromised Pro-Democratic Hong Kong Websites. Warning: Many of these websites may still be compromised and present a risk to visitors. Browse with caution. Alliance for True Democracy – Hong Kong. This JavaScript file is called from other parts of the website and effectively nests the loading of additional JavaScript written and interpeted as:. Script language=javascript src=http:/ java-se.com/o.js /script. While Vo...
defendthehoneypot.com
Links - Defend The Honey Pot
http://www.defendthehoneypot.com/links
Defend The Honey Pot. This site provides links and info to malware sites. Site for malware sites and block lists. Repository of block lists. Site explains Active Directory attacks and how to defend against them. NSA Information Assurance Site. Repository of how to secure network. Repository for Security Technical Implementation Guides. Adversary Simulation and Red Team Operations (Been on the receiving side a few times). This is a great site for STIG explanations and references. Palo Alto URL/IP Lookup.
blog.9bplus.com
Who’s in the Photo of the Wired Article? | 9b+
http://blog.9bplus.com/whos-in-the-photo-of-the-wired-article
Who’s in the Photo of the Wired Article? Bull; September 13, 2014 • Uncategorized. Due to my poor travel timing, I wasn’t able to really engage in conversation when the Virustotal Wired article. Came out. One of the questions that seemed to float around was who was in the photo behind me? Honestly, aside from just being good friends with Claudio, I respect him a lot and wanted to show some love. Here’s a list of some of the projects I really enjoy:. Shameless, I know). Over a year ago. Over a year ago.