PDFStreamDumper is a PDF analyzer developed by Sandsprite’s David Zimmer. He has added quite a bit of useful functions to make this an all-in-one, go-to tool as you’ll soon see. Here’s a spear-phish email that contains a malicious PDF file attachment: This PDF file is quite unusual. When you view it in Notepad, you normally can see readable strings and the magic bytes at the beginning. In this cas
After giving my Malicious PDF Analysis workshop at Hack In The Box Amsterdam, I decided to produce a screencast for each exercise (there are 20 exercises). You can find the first screencasts here. More will be produced soon. Materials you’ll need for the exercises: my PDF tools the exercises themselves (password for the ZIP file is “infected” without the double-quotes; there’s no malware in the ex
Finding and Understanding Bugs in C Compilers Xuejun Yang Yang Chen Eric Eide John Regehr University of Utah, School of Computing { jxyang, chenyang, eeide, regehr }@cs.utah.edu Abstract Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported m
Malicious PDF files are frequently used as part of targeted and mass-scale computer attacks. Being able to analyze PDFs to understand the associated threats is an increasingly important skill for security incident responders and digital forensic analysts. Here are 6 free tools you can install on your system and use for this purpose. Analyzing a PDF file involves examining, decoding and extracting
peepdf is a Python tool to explore PDF files in order to find out if the file can be harmful or not. The aim of this tool is to provide all the necessary components that a security researcher could need in a PDF analysis without using 3 or 4 tools to make all the tasks. With peepdf it's possible to see all the objects in the document showing the suspicious elements, supports the most used filters
This is a free tool for the analysis of malicious PDF documents. This tool has been made possible through the use of a mountain of open source code. Thank you to all of the authors involved. Has specialized tools for dealing with obsfuscated javascript, low level pdf headers and objects, and shellcode. In terms of shellcode analysis, it has an integrated interface for libemu sctest, an updated bui
Conference Details We're pleased to announce our 2008 conference lineup. More talks will be added as they are confirmed. The conference will be composed of 30 and 60 minutes talks on a single track, and will have lightning talks during Recon Party. Guest Speakers Ilfak Guilfanov - Building plugins for IDA Pro updated Michael Strangelove - Hacking Culture Nicolas Brulez - Polymorphic Virus Analysis
Recon is a Threat Intelligence query tool for cybersecurity analysts, by cybersecurity analysts. It provides unique access into Pure Signal™ internet traffic telemetry, the world’s largest threat intelligence data ocean. Analysts use Pure Signal™ Recon as part of a Cyber Defense process to identify, map and block external cyber threats regardless of their origin, geography or link in the chain
PDFファイルをご覧になるにはAdobeReaderが必要です。 AdobeReaderは、Adobe社AdobeReaderダウンロードサイトから ダウンロードできます。
Smashing Adobe's Heap Memory Management Systems for Profit. 2009.October.16 In-depth research on the recent PDF zero-day exploit Research and Analysis: Haifei Li Editors: Guillaume Lovet (Editing & Overview), Derek Manky Index: Introduction Overview Section 1: The Vulnerability Section 2: The Exploitation 2.1: The Mystery Function 2.2: Taking Control of the Execution Flow 2.3: The Heap Spray 2.4:
PDFtk is a simple tool for doing everyday things with PDF documents. It comes in three flavors: PDFtk Free, PDFtk Pro, and our original command-line tool PDFtk Server. PDFtk PDFtk Free is our friendly graphical tool for quickly merging and splitting PDF documents and pages. It is free to use for as long as you like. Power Users: PDFtk Free comes with our command-line tool, PDFtk Server. So you get
See also my blog Contents Optimization manuals Vector class library Object file converter and disassembler Subroutine library ForwardCom: An open standard instruction set for high performance microprocessors Test programs for measuring clock cycles in C++ and assembly code Floating point exception tracking through NAN propagation CPUID manipulation program Links Optimization manuals This series of
Free course demos allow you to see course content, watch world-class instructors in action, and evaluate course difficulty.
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く