Anti-virus Artifacts II is out!
Besides listing API hooks from Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro & WebRoot, I have documented their drivers, IRP requests, altitudes, and web traffic sent from the AV. I hope you like it! ♥️
cutt.ly/AV-Artifacts-II
@DevishaRochlani I like the AV artifacts repo, would be nice to expand it. can you explain your methodology to retrieve said artifacts? I assume wireshark/procmon/syslog/... were involved? :) maybe would be a nice additional paper in the repo?
Hello everyone, we are up with small blogs:
1. Using OSINT to investigate Cryptocurrency Transaction:
medium.com/ax1al/using-osint…
2. Recovering clock from Arduino.(Wlessly) :
ax1al.com/community_papers.h…
We have also added a lot of new maldocs sample to our R4PT0R Project 🥰
#osint
[Retweet]
20th September 2020
@smelly__vx & I have released our 1st entry in our Windows Persistence Series: Masquerading HKCU Run Keys
This is a simple, yet overlooked, technique. Our paper includes a listing of vuln apps & a PoC.
cutt.ly/HKCU-Run-Key
We'd like to uncomfortably announce we have received the source code to IoT Ransomware. that targets... Male Chastity devices...
You can download and view the source code to Trojan-Ransom.Python.ChastityLock here:
github.com/vxunderground/Mal…
We are very happy and grateful to announce that @tcpdirect is now hosting us. Thank you so much @yunginnanet, Much love to TCP Direct from Nerds of AX1AL ♥️
Happy New Year🥳,We are happy to release our small project HAWK BASE, 🦅 based on APT and other threat groups and their attribution, also built a small discord bot which loads the insights on the various threat groups and their possible attribution(1/3)
ax1al.com/projects/hawkbase/…