blog.securitybreak.io Open in urlscan Pro
162.159.153.4  Public Scan

Submitted URL: http://blog.securitybreak.io/
Effective URL: https://blog.securitybreak.io/?gi=99c6eada46b9
Submission: On February 21 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

To make Medium work, we log user data. By using Medium, you agree to our Privacy
Policy, including cookie policy.

Homepage
Open in app
Sign inGet started



SECURITY BREAK


SOME POSTS ABOUT SECURITY, MALWARE, REVERSE ENGINEERING


Reversing TipsMalware AnalysisMakerBreakOtherHome
FollowFollowing
Security infographics
SECURITY INFOGRAPHICS

I often do infographics to share security concepts or best practices. This page
will list the different files. I’ll update it periodically…
Thomas Roccia
Aug 29, 2020
Fifty Shades of Malware Strings
FIFTY SHADES OF MALWARE STRINGS

When analysing malware, string extraction is one of the first things to do to
briefly extract useful information such as IP address…
Thomas Roccia
Jul 24, 2020
Fifty Shades of Malware Hashing
FIFTY SHADES OF MALWARE HASHING

In forensic investigation as well as malware research, hashing is one of the
most prevalent techniques to identify a file as malicious or…
Thomas Roccia
Sep 29, 2019
Introducing Yara Toolkit
INTRODUCING YARA TOOLKIT

Your One Stop for All Things Yara!
Thomas Roccia
Jan 7
#100DaysOfYara Challenge
#100DAYSOFYARA CHALLENGE

The 100 Days of Yara is a fun challenge created by Greg Lesnewic and inspired by
the 100 Days of Code which I did couple year ago.
Thomas Roccia
Dec 31, 2023
Applying LLMs to Threat Intelligence
APPLYING LLMS TO THREAT INTELLIGENCE

A Practical Guide with Code Examples
Thomas Roccia
Nov 3, 2023
The Intel Brief by SecurityBreak
THE INTEL BRIEF BY SECURITYBREAK

An LLM Experiment
Thomas Roccia
Sep 26, 2023
Investigation of a targeted attack in the CryptoCurrency field
INVESTIGATION OF A TARGETED ATTACK IN THE CRYPTOCURRENCY FIELD

I investigated a campaign targeting the cryptocurrency industry. I wrote a
detailed report that includes TTP, IOC and more. This thread was…
Thomas Roccia
Dec 29, 2022
My Jupyter Collection
MY JUPYTER COLLECTION

I work with Jupyter notebook on a daily base for analysis, threat intelligence
and creating workflows! I created a Github page to share…
Thomas Roccia
Dec 28, 2022
Dhash Icon
DHASH ICON

Identify similar icons used in malware
Thomas Roccia
Dec 26, 2022
Code Graphology
CODE GRAPHOLOGY

How to study an exploit to discover more?
Thomas Roccia
Dec 20, 2022
6 Useful Infographics for Threat Intelligence
6 USEFUL INFOGRAPHICS FOR THREAT INTELLIGENCE

Visualizing Cybersecurity concepts can be a terrific way to learn more about
specific tools, methodologies, and techniques! Here is a post…
Thomas Roccia
Dec 17, 2022
10 Underrated Resources about Malware Techniques
10 UNDERRATED RESOURCES ABOUT MALWARE TECHNIQUES

This is a list of various resources to learn more about malware techniques, how
to analyse them and how to improve your detection! This…
Thomas Roccia
Dec 16, 2022
[Reverse Engineering Tips] — IDA Pro Shortcut Cheat Sheet
[REVERSE ENGINEERING TIPS] — IDA PRO SHORTCUT CHEAT SHEET

This is short post to keep a track of the IDA shortcut cheat sheet available
here. Happy reversing! :)
Thomas Roccia
Jun 12, 2022
10 Python Libraries for Malware Analysis and Reverse Engineering
10 PYTHON LIBRARIES FOR MALWARE ANALYSIS AND REVERSE ENGINEERING

With code example!
Thomas Roccia
Jun 7, 2022
External References
EXTERNAL REFERENCES

This page serves as a record of my external endeavors, including writing blogs,
conducting research, presenting at conferences, and…
Thomas Roccia
May 9, 2022
[Reverse Engineering Tips] — Unpacking InnoSetup
[REVERSE ENGINEERING TIPS] — UNPACKING INNOSETUP

To deliver an application, developers can use Windows installers. Windows
installers are software components used for installing…
Thomas Roccia
Mar 14, 2022
My Top Books to Learn Malware Analysis and Reverse Engineering
MY TOP BOOKS TO LEARN MALWARE ANALYSIS AND REVERSE ENGINEERING

I often get messages from people wanting to learn more about reverse engineering
and malware. I always refer to the same books and I though…
Thomas Roccia
Feb 21, 2022
Log4Shell Visualization
LOG4SHELL VISUALIZATION

The Log4Shell (CVE-2021–44228) is a zero-day vulnerability in Log4j a Java
logging framework, which has been released in December 2021…
Thomas Roccia
Dec 21, 2021
[Reverse Engineering Tips] — Extracting MSU file
[REVERSE ENGINEERING TIPS] — EXTRACTING MSU FILE

To understand a vulnerability, it is sometimes useful to study the patch and
compare it to see what has changed. On the Windows…
Thomas Roccia
Dec 9, 2021
3D Printing Industrial Control System Simulation
3D PRINTING INDUSTRIAL CONTROL SYSTEM SIMULATION

This article is a repost from the McAfee website. I wrote this during my time at
McAfee Labs in the Advanced Threat Research team. It is an…
Thomas Roccia
Nov 26, 2021
[Reverse Engineering Tips] — Enumerators
[REVERSE ENGINEERING TIPS] — ENUMERATORS

When doing reverse engineering, it is important to understand the data
structures that can be used by a program. Being able to reconstruct…
Thomas Roccia
Nov 25, 2021
[Reverse Engineering Tips] — Run-Time Type Identification
[REVERSE ENGINEERING TIPS] — RUN-TIME TYPE IDENTIFICATION

Run-time type information (RTTI) is a feature of C++ that allows the
determination of an object data type at runtime (runtime, or…
Thomas Roccia
Mar 19, 2021
[Reverse Engineering Tips] — Name Mangling
[REVERSE ENGINEERING TIPS] — NAME MANGLING

Name mangling is a mechanism used by compilers to add additional characters to
functions with the same name (function overloading). The…
Thomas Roccia
Mar 12, 2021
[Reverse Engineering Tips] — Strings Deobfuscation with FLOSS
[REVERSE ENGINEERING TIPS] — STRINGS DEOBFUSCATION WITH FLOSS

Deobfuscation is an important part of malware analysis. Many malware currently
uses obfuscation to hide from analysts but also to avoid…
Thomas Roccia
Feb 5, 2021
[Reverse Engineering Tips] — Binary Diffing
[REVERSE ENGINEERING TIPS] — BINARY DIFFING

Binary diffing is a great way to visualize and spot differences in multiple
samples. As a malware researcher, this is useful for…
Thomas Roccia
Jan 23, 2021
[Reverse Engineering Tips] — IDA Python
[REVERSE ENGINEERING TIPS] — IDA PYTHON

One of the greatest features of IDA is the ability to use Python directly in the
interface to manipulate the disassembly code. IDAPython…
Thomas Roccia
Jan 8, 2021
[Reverse Engineering Tips] — Kernel Debugging on Windows 10
[REVERSE ENGINEERING TIPS] — KERNEL DEBUGGING ON WINDOWS 10

The Windows kernel allows the operating system to interact with the hardware and
system resources of the computer. It runs the code in a…
Thomas Roccia
Dec 4, 2020
About SecurityBreakLatest StoriesArchiveAbout MediumTermsPrivacyTeams