Jump to content

malsploit

Moderators
  • Posts

    1965
  • Joined

  • Last visited

  • Days Won

    20

malsploit last won the day on June 17 2020

malsploit had the most liked content!

1 Follower

About malsploit

  • Birthday 03/06/1991

Contact Methods

  • Website URL
    https://malsploit.com

Profile Information

  • Gender
    Male
  • Location
    Constanta
  • Interests
    security researcher | romanian | member of CCSIR | web application penetration testing | malware hunter/researcher/analyst

Converted

  • Biography
    security researcher | malware hunter | romanian
  • Location
    Constanta

Recent Profile Visitors

6489 profile views

malsploit's Achievements

Newbie

Newbie (1/14)

  • Week One Done Rare
  • One Month Later Rare
  • One Year In Rare

Recent Badges

764

Reputation

  1. https://medium.com/@hlopez_/how-are-public-and-private-keys-created-in-bitcoin-f90b2b88f40a E strict pentru a arata tipul de cheie privata:
  2. https://en.wikipedia.org/wiki/P_versus_NP_problem https://en.wikipedia.org/wiki/Birthday_problem Foarte putin probabil sa ghicesti un algoritm doar uitandu-te la datele de intrare si cele de iesire. Avantajul, in cazul asta, este faptul ca posibilitatile sunt oarecum limitate de faptul ca setul de date este relativ mic. Oricum, daca ne oferi mai multe informatii, e posibil sa primesti mai mult ajutor.
  3. it's always DNS (OR BGP)
  4. Am facut si eu ceva de genul asta, dar din lipsa de timp, am abandonat proiectul. Eu aveam si cuckoo instalat pe un dedicat. Am cumparat un domeniu care a fost anterior folosit ca si serviciu de mail temporar, am pus catch all pe el si luam toate mailurile pe care le primeam pe zi (15-20k) , extrageam atasamentele, le bagam in cuckoo si de acolo luam indicatori de compromitere ca sa populez MISP. Erau destul de multe date si era interesant. Problema a fost lipsa de timp. Mai am ceva scripturi pe care le foloseam ca sa automatizez, dar nu cred ca e ceva quality pe acolo Am improvizat foarte mult si cred ca ce faceam eu intr-o suta de linii, altcineva rezolva mult mai usor. Important e ca functiona
  5. Daca nu ai instalat ceva programe pe el care sa "sune acasa", nu prea ai ce sa-i faci.
  6. https://www.goodreads.com/book/show/8524528-the-conspiracy-against-the-human-race
  7. Pune-ti parola aici si vezi daca a aparut pe undeva. https://haveibeenpwned.com/Passwords
  8. https://sites.google.com/secured.org/malwareunicorn/reverse-engineering/re101
  9. Poate o sa te surpinda, dar ce ai tu se poate diagnostica si chiar, se poate trata.
  10. M-am oprit la "Asa e romanul vai de capul lui". As fi vrut sa iti explic de ce esti idiot, dar nu merita timpul pierdut. Probabil o sa te transformi inca unul cu diploma de licenta, angajat pe la multinationale (kfc, mcdonalds).
  11. https://labs.strava.com/heatmap/#2.98/79.67014/43.32969/hot/all
  12. foloseste ethos de la ethosdistro.com
  13. RetDec RetDec is a retargetable machine-code decompiler based on LLVM. The decompiler is not limited to any particular target architecture, operating system, or executable file format: Supported file formats: ELF, PE, Mach-O, COFF, AR (archive), Intel HEX, and raw machine code. Supported architectures (32b only): Intel x86, ARM, MIPS, PIC32, and PowerPC. Features: Static analysis of executable files with detailed information. Compiler and packer detection. Loading and instruction decoding. Signature-based removal of statically linked library code. Extraction and utilization of debugging information (DWARF, PDB). Reconstruction of instruction idioms. Detection and reconstruction of C++ class hierarchies (RTTI, vtables). Demangling of symbols from C++ binaries (GCC, MSVC, Borland). Reconstruction of functions, types, and high-level constructs. Integrated disassembler. Output in two high-level languages: C and a Python-like language. Generation of call graphs, control-flow graphs, and various statistics. https://github.com/avast-tl/retdec
×
×
  • Create New...