Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer. This book will show you how to effectively manipulate and monitor different conversations and perform statistical analysis of these...
All-in-One malware analysis tool for analyze Windows, Linux, OSX binaries, Document files and APK files.
You can get:
What DLL files are used.
Functions and APIs.
Sections and segments.
URLs, IP addresses and emails.
Android permissions.
File extensions and their...
(PDF + Videos)
Learn the foundations of cybersecurity defense with Foundational Security Operations and Defensive Analysis (SOC-200), a course designed for job roles such as Security Operations Center (SOC) Analysts and Threat Hunters. Learners gain hands-on experience with a SIEM, identifying...
Cuckoo VM for Malware Analysis By binaryzone
If you do not want to put some time in installing your own Cuckoo Sandbox for different reasons, then you could just download the Virtual Machine (VM) that I have prepared. What I’ve done is get Cuckoo to run in a VM, so you might be asking what...
Cppcheck is a static analysis tool for C/C++ code. It provides a unique code analysis to detect bugs and focuses on detecting undefined behavior and dangerous coding constructs. The goal is to detect only real errors in the code (i.e. have very few false positives).
Features
Unique code...
Graphical interface for PortEx, a Portable Executable and Malware Analysis Library.
PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala and targeted at Java...
Description
Welcome guys in this course I will be your instructor. In this course I will talk straight to the point. Therefore, we will cover more in less time.
I tried my best to make this course compact and valuable. Because lots of people don’t have enough time to watch lengthy courses. So...
During bug bounties, penetrations tests, red teams exercises, and other great activities, there is always a room when you need to launch amass, subfinder, sublister, or any other tool to find subdomains you can use to break through - like test.google.com, dev.admin.paypal.com or...
Understand the Dark Web and Dark Net for effective cybersecurity
Key Features
Learn the concepts of Dark Net and Deep Web
Use Tor to extract data and maintain anonymity
Develop a security framework using Deep Web evidence
Book Description
The World Wide Web is divided into...
PortEx is a Java library for static malware analysis of Portable Executable files. Its focus is on PE malformation robustness, and anomaly detection. PortEx is written in Java and Scala, and targeted at Java applications.
Features
Reading header information from: MSDOS Header, COFF File...
Description
Welcome guys my name is Anwer Khan, and I will be your instructor throughout this course. In this course we will talk straight to the point. Therefore, we will cover more in less time.
First, did you know that being able to understand what’s on the network is considered a...
efiXplorer – IDA plugin for UEFI firmware analysis and reverse engineering automation
Supported versions of Hex-Rays products: every time we focus on the last versions of IDA and Decompiler because trying to use the most recent features from new SDK releases. That means we tested only on recent...
Learn web server log analysis and identify malicious traffic.
Description
Some Important Questions.
Are you curious on how an attack pattern looks when a web application is under a malicious attack?
Are you interested in knowing the basics of attack detection and what tools and...
Description
Attention Traders, Investors & Stock Market Lovers!
Finally You’ll Master Technical Analysis & Start Earning Extra Income Online By Trading From The Comfort of Your Home. Get Results or Your Money Back!
The Technical Analysis Bootcamp is designed to help you upgrade your...
Turbo Website Reviewer helps to identify your SEO mistakes and optimize your web page contents for a better search engine ranking. It also offers side-by-side SEO comparisons with your competitors. Analysis report also be downloaded as PDF file for offline usage...
Description
Welcome guys my name is Anwer Khan and I will be your instructor throughout this course. In this course we will talk straight to the point. Therefore, we will cover more in less time.
First, Did you know that being able to understand what’s on the network is considered a...
An Obfuscation-Neglect Android Malware Scoring System
Android malware analysis engine is not a new story. Every antivirus company has its own secrets to build it. With curiosity, we develop a malware scoring system from the perspective of Taiwan Criminal Law in an easy but solid way.
We have...
A machine learning malware analysis framework for Android apps.
DroidDetective is a Python tool for analysing Android applications (APKs) for potential malware related behaviour and configurations. When provided with a path to an application (APK file) Droid Detective will make a prediction...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.