Group for Malware Analysts. Pinned message with resources and rules: https://t.me/MalwareResearch/38033
hey is newrelic x-insert-key or insight key is meant to be public?
Читать полностью…there is a thing called Google Calendar and Google Sheets that can combine together and do wonders without $25
Читать полностью…Hi everyone, I have I Sony xz2 that I tried to root 6 months ago and the problem is that the bootloader is just impossible to unlock I already try all methods like use the code for unclock and even see in xda forums what I can do and I found just one thing is that to pay 25$ for use a specific app that work for 5 peoples but I don't have money for it
What I can do to unclock it without pay anything?
If you mean malware in email attachments, here's a site with some samples
https://malware-traffic-analysis.net/index.html
And also, ask your questions directly. Don't ask to ask
Hello @DykL57, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…Hello @MariodBehkam, welcome to the Malware Research group! Please read the pinned message before you post!
Читать полностью…There's dynamic and static analysis
Choose your poison
Just to make sure I understand you correctly, you mean you saw data being posted to the email address?
Similar to how some phishers would collect phished data and send it to an email address?
User Jeremie has 1/3 warnings; be careful!
Reason:
last warning - no piracy, or the next is a ban
Does Anyone know a Ai that is similar to white rabbit Neo??
Читать полностью…eyou, anyone have seen the malware of outlook?, where by a link you got remote access?, i have some questions
Читать полностью…No problem fam, here you can find a lot of things to increase your skills
https://github.com/Malware-Research/Resources
what would be the best way to reverse engineer a rat? would like to see if there's any trojans in there
Читать полностью…You mean email was found in a data breach? How do you use an email in a data breach?
Читать полностью…Maybe or may not malware was used by it or no idea regarding that
Читать полностью…