blog.securitybreak.io
Open in
urlscan Pro
162.159.153.4
Public Scan
Submitted URL: http://blog.securitybreak.io/
Effective URL: https://blog.securitybreak.io/?gi=99c6eada46b9
Submission: On February 21 via api from US — Scanned from DE
Effective URL: https://blog.securitybreak.io/?gi=99c6eada46b9
Submission: On February 21 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
To make Medium work, we log user data. By using Medium, you agree to our Privacy Policy, including cookie policy. Homepage Open in app Sign inGet started SECURITY BREAK SOME POSTS ABOUT SECURITY, MALWARE, REVERSE ENGINEERING Reversing TipsMalware AnalysisMakerBreakOtherHome FollowFollowing Security infographics SECURITY INFOGRAPHICS I often do infographics to share security concepts or best practices. This page will list the different files. I’ll update it periodically… Thomas Roccia Aug 29, 2020 Fifty Shades of Malware Strings FIFTY SHADES OF MALWARE STRINGS When analysing malware, string extraction is one of the first things to do to briefly extract useful information such as IP address… Thomas Roccia Jul 24, 2020 Fifty Shades of Malware Hashing FIFTY SHADES OF MALWARE HASHING In forensic investigation as well as malware research, hashing is one of the most prevalent techniques to identify a file as malicious or… Thomas Roccia Sep 29, 2019 Introducing Yara Toolkit INTRODUCING YARA TOOLKIT Your One Stop for All Things Yara! Thomas Roccia Jan 7 #100DaysOfYara Challenge #100DAYSOFYARA CHALLENGE The 100 Days of Yara is a fun challenge created by Greg Lesnewic and inspired by the 100 Days of Code which I did couple year ago. Thomas Roccia Dec 31, 2023 Applying LLMs to Threat Intelligence APPLYING LLMS TO THREAT INTELLIGENCE A Practical Guide with Code Examples Thomas Roccia Nov 3, 2023 The Intel Brief by SecurityBreak THE INTEL BRIEF BY SECURITYBREAK An LLM Experiment Thomas Roccia Sep 26, 2023 Investigation of a targeted attack in the CryptoCurrency field INVESTIGATION OF A TARGETED ATTACK IN THE CRYPTOCURRENCY FIELD I investigated a campaign targeting the cryptocurrency industry. I wrote a detailed report that includes TTP, IOC and more. This thread was… Thomas Roccia Dec 29, 2022 My Jupyter Collection MY JUPYTER COLLECTION I work with Jupyter notebook on a daily base for analysis, threat intelligence and creating workflows! I created a Github page to share… Thomas Roccia Dec 28, 2022 Dhash Icon DHASH ICON Identify similar icons used in malware Thomas Roccia Dec 26, 2022 Code Graphology CODE GRAPHOLOGY How to study an exploit to discover more? Thomas Roccia Dec 20, 2022 6 Useful Infographics for Threat Intelligence 6 USEFUL INFOGRAPHICS FOR THREAT INTELLIGENCE Visualizing Cybersecurity concepts can be a terrific way to learn more about specific tools, methodologies, and techniques! Here is a post… Thomas Roccia Dec 17, 2022 10 Underrated Resources about Malware Techniques 10 UNDERRATED RESOURCES ABOUT MALWARE TECHNIQUES This is a list of various resources to learn more about malware techniques, how to analyse them and how to improve your detection! This… Thomas Roccia Dec 16, 2022 [Reverse Engineering Tips] — IDA Pro Shortcut Cheat Sheet [REVERSE ENGINEERING TIPS] — IDA PRO SHORTCUT CHEAT SHEET This is short post to keep a track of the IDA shortcut cheat sheet available here. Happy reversing! :) Thomas Roccia Jun 12, 2022 10 Python Libraries for Malware Analysis and Reverse Engineering 10 PYTHON LIBRARIES FOR MALWARE ANALYSIS AND REVERSE ENGINEERING With code example! Thomas Roccia Jun 7, 2022 External References EXTERNAL REFERENCES This page serves as a record of my external endeavors, including writing blogs, conducting research, presenting at conferences, and… Thomas Roccia May 9, 2022 [Reverse Engineering Tips] — Unpacking InnoSetup [REVERSE ENGINEERING TIPS] — UNPACKING INNOSETUP To deliver an application, developers can use Windows installers. Windows installers are software components used for installing… Thomas Roccia Mar 14, 2022 My Top Books to Learn Malware Analysis and Reverse Engineering MY TOP BOOKS TO LEARN MALWARE ANALYSIS AND REVERSE ENGINEERING I often get messages from people wanting to learn more about reverse engineering and malware. I always refer to the same books and I though… Thomas Roccia Feb 21, 2022 Log4Shell Visualization LOG4SHELL VISUALIZATION The Log4Shell (CVE-2021–44228) is a zero-day vulnerability in Log4j a Java logging framework, which has been released in December 2021… Thomas Roccia Dec 21, 2021 [Reverse Engineering Tips] — Extracting MSU file [REVERSE ENGINEERING TIPS] — EXTRACTING MSU FILE To understand a vulnerability, it is sometimes useful to study the patch and compare it to see what has changed. On the Windows… Thomas Roccia Dec 9, 2021 3D Printing Industrial Control System Simulation 3D PRINTING INDUSTRIAL CONTROL SYSTEM SIMULATION This article is a repost from the McAfee website. I wrote this during my time at McAfee Labs in the Advanced Threat Research team. It is an… Thomas Roccia Nov 26, 2021 [Reverse Engineering Tips] — Enumerators [REVERSE ENGINEERING TIPS] — ENUMERATORS When doing reverse engineering, it is important to understand the data structures that can be used by a program. Being able to reconstruct… Thomas Roccia Nov 25, 2021 [Reverse Engineering Tips] — Run-Time Type Identification [REVERSE ENGINEERING TIPS] — RUN-TIME TYPE IDENTIFICATION Run-time type information (RTTI) is a feature of C++ that allows the determination of an object data type at runtime (runtime, or… Thomas Roccia Mar 19, 2021 [Reverse Engineering Tips] — Name Mangling [REVERSE ENGINEERING TIPS] — NAME MANGLING Name mangling is a mechanism used by compilers to add additional characters to functions with the same name (function overloading). The… Thomas Roccia Mar 12, 2021 [Reverse Engineering Tips] — Strings Deobfuscation with FLOSS [REVERSE ENGINEERING TIPS] — STRINGS DEOBFUSCATION WITH FLOSS Deobfuscation is an important part of malware analysis. Many malware currently uses obfuscation to hide from analysts but also to avoid… Thomas Roccia Feb 5, 2021 [Reverse Engineering Tips] — Binary Diffing [REVERSE ENGINEERING TIPS] — BINARY DIFFING Binary diffing is a great way to visualize and spot differences in multiple samples. As a malware researcher, this is useful for… Thomas Roccia Jan 23, 2021 [Reverse Engineering Tips] — IDA Python [REVERSE ENGINEERING TIPS] — IDA PYTHON One of the greatest features of IDA is the ability to use Python directly in the interface to manipulate the disassembly code. IDAPython… Thomas Roccia Jan 8, 2021 [Reverse Engineering Tips] — Kernel Debugging on Windows 10 [REVERSE ENGINEERING TIPS] — KERNEL DEBUGGING ON WINDOWS 10 The Windows kernel allows the operating system to interact with the hardware and system resources of the computer. It runs the code in a… Thomas Roccia Dec 4, 2020 About SecurityBreakLatest StoriesArchiveAbout MediumTermsPrivacyTeams