Web Analytics
Mitaka OSINT friendly IOC Indicator of Compromise search tool

Mitaka OSINT friendly IOC Indicator of Compromise search tool


The Hacker News on Twitter: "Mitaka Chrome Extension → New #OSINT friendly IOC (Indicator of Compromise) search tool https://t.co/zPvvf7FgRG It extracts ...

GitHub - ninoseki/mitaka: OSINT friendly IoC (Indicator of Compromise) search tool

Supported devices

Phalanx 2 Revealed: Using Volatility to Analyze an Advanced Linux Rootkit

Grukz Follow

munin v0.14.1 released: Online hash checker for Virustotal and other services

... host and domain online lookup processing #Virustotal info > Coloured cmdline output > CSV output > Recursive lookups > Sample download > Ported to ...

KitPloit - Hacker Tools @KitPloit

REDasm: The Open Source Disassembler

EKFiddle v0.6.9 released: A framework to study Exploit Kits | Security news – Ειδήσεις Ασφαλείας | Study και Kit

Shylock In-Depth Malware Analysis

0 replies 1 retweet 3 likes

Fake Bomb Threat Emails Demanding Bitcoins Sparked Chaos Across US, Canada

Apfell v1.2 releases: A macOS, post-exploit, red teaming framework

vthunting: generate report about Virus Total hunting and send it by email, slack or telegram

1 reply 39 retweets 43 likes

Data Group @Gdatateam

YARA 3.10.0 releases, The pattern matching swiss knife

Examining Shellcode in a Debugger through Control of the Instruction Pointer

Get an extra #edge over rival #IT companies to accelerate your #business by using our #Technographics #databases for #market assessments.

0 replies 1 retweet 2 likes

Malicious spam continues to serve zip archives of javascript files

Minnesota Department of Human Services suffered a security breach

Ph055a Follow

0 replies 1 retweet 3 likes

New ...

1 reply 39 retweets 43 likes

Free Automated Malware Analysis Service - powered by Falcon Sandbox - Viewing online file analysis results for 'text8.zip'

Ethical Hacking

Free Automated Malware Analysis Service - powered by Falcon Sandbox - Viewing online file analysis results for 'text8.zip'

3 replies 88 retweets 128 likes

4igywzto reasonably small

0 replies 33 retweets 53 likes

[E.E. Gdoutos] Experimental Analysis of Nano and E(B-ok.xyz) | Fracture | Fatigue (Material)

Corsin Camichel cocaman


1 reply 39 retweets 43 likes

NEW DELHI: Google Search is one of the biggest and most used products by the firm. The application is something that we use almost every day.

Patel's Pearls of Poetry

Adversarial Robustness Toolbox v0.8 releases: crafting and analysis of attacks and defense methods for machine learning models

Block or report user

CAD/CAM Industry-Wide Interoperability Investment Paying Off By Rick Self, Executive Director

0 replies 21 retweets 48 likes




Block or report user

3 Free NirSoft Tools for Malware Analysis

AM6 BBK project - 47mm and 49mm [Archive] - ApriliaForum sponsored by AF1 Racing, inc.

ABBYY – a Russian OCR developer and text recognition firm – has reportedly left exposed a treasure trove of scanned documents. The database remained online ...


379335128 Theory of Relativity Ariny Amos Astronomer Author NOVEL 1 | Theory Of Relativity | General Relativity


Security researchers have discovered a serious code execution vulnerability in the LIVE555 Streaming Media library—which is being used by popular media ...

Sauron prefers manipulation over direct combat (though he is skilled in both) and when faced by a Numenorean army, Sauron CHOOSES to surrender, ...

Phishing AI

Kevin Holvoet digihash

After incorrect or unprovable statements made by Republican President Donald Trump and some White House aides, one truth is undeniable: Sales of George ...

0 replies 13 retweetů 21lajků

ウイルスバスター クラウド(最新版) | 3年 3台版 | オンラインコード版

A documentary on 20-year-old Hong Kong activist Joshua Wong Chi-fung, which made its world premier last Friday at the Sundance Film Festival, ...

Spammed malicious Word document runs PowerShell script that steals system data, but doesn't maintain any persistence on the victim's computer ...


An Overview of Malware Self-Defense and Protection

1 reply 28 retweets 45 likes

Cherry blossoms are in full bloom in the Mitaka campus of NAOJ in spring time. ©NAOJ

124582999 Japanese Visual Culture Explorations in the World of Manga and Anime PDF | Anime | Manga


1 reply 7 retweets 14 likes

tyton: Kernel-Mode Rootkit Hunter

Comment ...

(PDF) ICT-pedagogy integration in teacher training: application cases worldwide | Collins Kaluba - Academia.edu

Muslim man shows true spirit of Christmas by delivering presents to homeless people


Derbi Reactivation Project--The Return of the Wicked GPR [Archive] - ApriliaForum sponsored by AF1 Racing, inc.

ウイルスバスター クラウド | 30日 無料体験版 | ダウンロード版

apple ...

0 replies 2 retweets 1 like