unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Polymorphic Malware Using #AI
In the ever-evolving landscape of cybersecurity, malicious actors constantly seek new ways...
2023-5-25 20:41:14 | 阅读: 19 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
openai
generative
polymorphic
malicious
security
The Relevance of Prompts in AI and Cybersecurity
Introduction to PromptingArtificial Intelligence (AI) has become an increasingly popula...
2023-4-30 15:8:18 | 阅读: 6 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
prompts
sentence
involve
keras
Many Generative Pre-Trained Transformer (GPT): a pragmatic evaluation.
Artificial intelligence (AI) is a rapidly evolving field that involves the development of i...
2023-4-12 22:22:27 | 阅读: 7 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
gpt
tuning
llm
llama
gpt4
Reversing Emotet Dropping Javascript
Recently (On March 18 2023 at 23:44), a new malspam campaign has been observed in the wild...
2023-3-23 00:3:52 | 阅读: 17 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
analysis
stage
dropping
unused
Malware Families CheatSheet
During talks and presentations people often ask me how do I remember so m...
2023-3-2 22:55:30 | 阅读: 18 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
families
cheatsheet
hemmm
clusters
loader
Amazing Books: The Podcast
Skip to contentI believe books can change a live. I do also beli...
2023-2-20 16:8:26 | 阅读: 10 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
amazing
discussions
guests
aim
Threat Actors Sheets: OpenAI Generated !
InroductionChatGPT or more generally speaking OpenAI is an incredible tool. It is a spe...
2023-2-16 18:41:18 | 阅读: 16 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
apt28
trojans
phishing
sectors
military
Onenote Malware: Classification and Personal Notes
During the past 4 months Microsoft Onenote file format has been (ab)used as Malware carrier...
2023-2-4 16:17:56 | 阅读: 30 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
hash256
onenote
redline
microsoft
remcos
Most Exploited Vulnerabilities in 2022
Initial Access Brokers (IAB) are still the main way cyber criminals use to get access to th...
2022-12-27 16:1:35 | 阅读: 22 |
收藏
|
Marco Ramilli Web Corner - marcoramilli.com
exploited
remote
microsoft
attacker
Is Hagga Threat Actor (ab)using FSociety framework ?
IntroductionToday I’d like to share a quick analysis initiated during a threat hunting...
2022-11-21 23:36:56 | 阅读: 18 |
收藏
|
marcoramilli.com
rump
xls
decoded
ppam
fsociety
Phishing Kits: Threat Actors Analysis Research
IntroductionPhishing kits are tools that dark side experts provide to the community of...
2022-11-9 18:11:11 | 阅读: 14 |
收藏
|
marcoramilli.com
kits
phishing
novel
machine
Windows System Calls For Hunters
IntroductionSystem calls are the ultimate high-level atomic actions that Malware writer...
2022-8-23 15:12:22 | 阅读: 17 |
收藏
|
marcoramilli.com
malicious
wow64
abused
windows
network
Cyber Threats Tracker: Status Update
Today a simple update from my Cyber Threats Observatory (available HERE). Six months of thi...
2022-6-22 13:1:12 | 阅读: 8 |
收藏
|
marcoramilli.com
agenttesla
stereotypes
processes
threats
microsoft
Running Shellcode Through Windows Callbacks
IntroductionWhen I’ve firstly seen the technique behind the Shellcode execution through...
2022-6-15 13:44:0 | 阅读: 73 |
收藏
|
marcoramilli.com
x8b
shellcode
hdc
xd0
A Malware Analysis in RU-AU conflict
IntroductionWe are living difficult times. From pandemic to Russia-Ukraine war. I was t...
2022-5-10 16:18:5 | 阅读: 109 |
收藏
|
marcoramilli.com
analysis
windows
ukraine
stage
mckillican
From a Phishing Page to a Possible Threat Actor
DisclaimerThis blog post, as all the blog posts in my web-corner, want to share cyberse...
2022-4-14 14:42:39 | 阅读: 18 |
收藏
|
marcoramilli.com
phishing
omissis
malicious
analysis
DiskKill/HermeticWiper and NotPetya (Dis)similarities
Many security researchers, professional cybersecurity analysts and cybsec organizations rea...
2022-3-1 21:52:26 | 阅读: 12 |
收藏
|
marcoramilli.com
windows
diskkill
crash
notpetya
ukraine
Cybersecurity Standards: A Quick Overview
Skip to contentMany times you hear about cybersecurity standards...
2022-2-7 23:10:17 | 阅读: 15 |
收藏
|
marcoramilli.com
security
scope1
nameiso
Building your Kubernets Cluster For Cybersecurity Prototyping
Kubernets and server-less applications would be the biggest next things to protect. So it w...
2022-1-18 15:10:35 | 阅读: 8 |
收藏
|
marcoramilli.com
microk8s
kubernets
raspberry
network
pi4
APT28 SKINNYBOY: Cheat Sheet
Skip to contentAPT28, also known as Sofacy Group is an (in)famou...
2021-12-30 17:27:18 | 阅读: 7 |
收藏
|
marcoramilli.com
donation
apt28
cheat
rectangles
Previous
1
2
3
4
5
6
7
8
Next