Skip to content (Press Enter)
  • Sample Page

Just another WordPress site

  • Sample Page
Default Image

Month: January 2016

Creating a Malware Sandbox in Seconds with Noriben.

January 18, 2016May 20, 2025 Brian Baskin

Happy New Years! As part of the new year, let’s make an effort to make your defensive posture better, especially through quicker and more effective malware analysis! A few years ago I created a sample malware analysis sandbox script to use for the analysis and reverse engineering that I performed on a daily basis. Let’s …

Read More

Search

Archive List

  • March 2024
  • November 2022
  • March 2018
  • July 2017
  • August 2016
  • May 2016
  • March 2016
  • January 2016
  • September 2015
  • November 2014
  • September 2014
  • February 2014
  • January 2014
  • October 2013
  • September 2013
  • August 2013

Recent Posts

  • Huntress CTF 2023 – Unique Approaches to Fun Challenges
  • Flare-On 9 – The Worst Writeups
  • Enforcing the Law at the Mid Atlantic Collegiate Cyber Defense Competition (MACCDC)
  • Exploring the Labyrenth (2017 Edition)
  • Running the Labyrenth: Unit 42 CTF

Categories

  • Uncategorized

Archive List

  • March 2024
  • November 2022
  • March 2018
  • July 2017
  • August 2016
  • May 2016
  • March 2016
  • January 2016
  • September 2015
  • November 2014
  • September 2014
  • February 2014
  • January 2014
  • October 2013
  • September 2013
  • August 2013

Recent Posts

  • Huntress CTF 2023 – Unique Approaches to Fun Challenges
  • Flare-On 9 – The Worst Writeups
  • Enforcing the Law at the Mid Atlantic Collegiate Cyber Defense Competition (MACCDC)
  • Exploring the Labyrenth (2017 Edition)
  • Running the Labyrenth: Unit 42 CTF

Categories

  • Uncategorized

Tags

.net behavior analysis bsidesdc bsidesde cafebabe challenge class ctf cybergamut debugger dfir dynamic analysis encryption fernflower forensics gmail google ida infected infosec jad jar java jd-gui jdo jmd krakatau malware malware analysis matasano memory microsoft Noriben plaso privacy procmon python reverse engineering runtime security shedexec sysinternals trojan volatility windows
© 2025 Just another WordPress site. All Rights Reserved. Prime Cyber Security By Themeignite. Powered By WordPress.