Dynamic and static malware analysis using a lot of preconfigured environments.
Every analyst, during day by day experiences refines its own workflow for timeline creation. Today i propose mine.
Do you think that protect your Excel worksheet with password is safe? You are wrong!
Malware authors have always looked for new techniques to stay invisible. This includes being invisible on the compromised machine, but it is even more important to hide malicious indicators and behavior during analysis.
Parsing SetupAPI log for fun and profit!
Often i publish some small code snippets, usually written during development of large projects. Today i want to share a small PHP class that uses Twitter API in order to perform a search and downloads the most recents tweets.