|
You are here |
yurisk.info | ||
| | | | |
www.lab539.com
|
|
| | | | | This LimaCharlie lookup allows you to check whether binaries being executed on your Linux system are known malware and create rules or actions that trigger if so. This is a free lookup provided by Lab539 which pulls from various sources including our own sensor network. | |
| | | | |
blog.nuculabs.de
|
|
| | | | | I always wanted to play around with a binary analysis framework but most of the time I was turned off by how difficult it was to install and use it. Just recently I've thought to give angr a try and now I want to share my experience with you! I will present you a two scripts that solve two challenges, if you wish to dig deeper and learn Angr then you should visit it's official documentation. | |
| | | | |
gist.github.com
|
|
| | | | | Get process name and argv in Solaris from /proc/[pid/psinfo - solaris_getprocs.c | |
| | | | |
pentestlab.blog
|
|
| | | 1 post published by Administrator on March 9, 2017 | ||