Ethical Hacking Tutorials

Ethical Hacking Tutorials, Tips and Tricks

Category: Malware Analysis

Ghidra – Free Reverse Engineering Tool Released by NSA

NSA released Ghidra a free reverse Engineering tool for Malware analyst with an interactive GUI capability that runs on various platforms including Windows, Mac OS, and Linux and supports a number of processor modules. Ghidra gives flexibility for users to create additional plug-in components and scripts using Java or Python. It helps in analyzing malicious […]

MISP – Malware Information Sharing Platform and Threat Sharing

The objective of MISP is to foster the sharing of structured information within the security community and abroad. MISP provides functionalities to support the exchange of information but also the consumption of the information by Network Intrusion Detection System (NIDS), LIDS but also log analysis tools, SIEMs.MISP, is an open source software solution for collecting, […]

Malboxes: Builds malware analysis Windows VMs

Malboxes is a tool to streamline and simplify the creation and management of virtual machines used for malware analysis. Building analysis machines is a tedious task. One must have all the proper tools installed on a VM such as a specific version of vulnerable software (ie: Flash), Sysinternal tools, debuggers (Windbg), network traffic analyzers (Wireshark), […]

Flawfinder v2.0.7 – Searches through C/C++ source code looking for potential security flaws

To run flawfinder, simply give flawfinder a list of directories or files. For each directory given, all files that have C/C++ filename extensions in that directory (and its subdirectories, recursively) will be examined. Thus, for most projects, simply give flawfinder the name of the source code’s topmost directory (use ‘‘.’’ for the current directory), and […]

Manticore – Dynamic Binary Analysis Tool

Manticore comes with an easy-to-use command line tool that quickly generates new program “test cases” (or sample inputs) with symbolic execution. Each test case results in a unique outcome when running the program, like a normal process exit or crash (e.g., invalid program counter, invalid memory read/write). The command line tool satisfies some use cases, […]

Ethical Hacking Tutorials © 2018
Skip to toolbar