0x534a/dynmx: Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!
Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces! - GitHub - 0x534a/dynmx: Signature-based detection of malware featu...
Introduction System calls are the ultimate high-level atomic actions that Malware writers might control. System calls sequences are the defacto ultimate way to divide behaviors between good and bad…
ImpELF: Unmasking Linux Malware with a Novel Imphash Approach for ELF Binaries
As someone that primarily does Linux security research, I was frustrated that there wasn't an equivalent of an imphash for Linux ELF binaries. So, I decided to make one myself.
Two Tools for Malware Analysis and Reverse Engineering in Ghidra
This post presents two tools for malware analysis and reverse engineering in Ghidra, the National Security Agency’s software reverse engineering tool suite.