THREAT
rack
Blog
@THREATrack
Updated: 2020-12-20
2020-02-21:
Binary clustering with r2pipe, capstone and Gephi: “DnA GeNoMe mAlWaRe AtTrIbUtIoN EnGiNeS” demystified
2019-10-17:
Limits of Ghidra Patch Diffing: Response to Maddie Stone’s talk about diffing CVE-2019-3568
2019-10-10:
Custom Ghidra Version Tracking Correlator: Towards Usable Patch Diffing
2019-10-02:
Patch Diffing with Ghidra: Using Version Tracking to Diff a LibPNG Update
2019-09-20:
Ghidra FID generation: Automate .fidb generation with headless Ghidra
2019-09-08:
Improve account security with U2F: Current state of U2F for various online services
2019-08-18:
Quo DMARC .de?: Verbreitung des Emailfälschungsschutzes DMARC in Deutschland
2019-08-14:
Email spoofing telemetry with DMARC: Get reports of who spoofs your domain
2019-08-02:
A simple spamtrap setup: Buy a domain, VPS and run a script and you too run a spamtrap
2019-07-30:
Jumpstarting your malspam honeypot: Using an ex-email provider’s domain as a (mal-)spam collector
2019-04-30:
Ghidra Review: Featuring: Shadow Hammer (Stage 1: Setup.exe) Analysis, The Engineering in Reverse Engineering and Automation
2019-04-12:
gHIDEra: Hidding from the NSA: Incorrect handling of sectionAlignment leads to data hiding opportunities against Ghidra
2019-04-02:
Scoping the security boundaries of a low cost hardware password safe: Superficial security assessment of the “PasswordsFAST” hardware password safe
2017-11-11:
Inside a low budget consumer hardware espionage implant: Analysis of the S8 data line locator