metatool.py is a tool to help with the analysis of Metasploit or Cobalt Strike URLs.
More info can be found in my SANS Internet Storm Center diary entry “Finding Metasploit & Cobalt Strike URLs“.
It is still in my Github beta repository here.
metatool.py is a tool to help with the analysis of Metasploit or Cobalt Strike URLs.
More info can be found in my SANS Internet Storm Center diary entry “Finding Metasploit & Cobalt Strike URLs“.
It is still in my Github beta repository here.
Here is an overview of content I published in March:
Blog posts:
YouTube videos:
Videoblog posts:
SANS ISC Diary entries:
Here is an overview of content I published in February:
Blog posts:
YouTube videos:
Videoblog posts:
SANS ISC Diary entries:
Here is an overview of content I published in January:
Blog posts:
YouTube videos:
Videoblog posts:
SANS ISC Diary entries:
Here is an overview of content I published in 2020:
Blog posts:
YouTube videos:
Videoblog posts:
SANS ISC Diary entries:
NVISO blog posts:
Here is an overview of content I published in December:
Blog posts:
YouTube videos:
Videoblog posts:
SANS ISC Diary entries:
Here is an overview of content I published in November:
Blog posts:
YouTube videos:
Videoblog posts:
SANS ISC Diary entries:
Blog posts:
YouTube videos:
Videoblog posts:
SANS ISC Diary entries:
Here is an overview of content I published in September:
Blog posts:
SANS ISC Diary entries:
NVISO blog posts:
Over the last months, I’ve been quite busy working with my colleagues on report “Epic Manchego – atypical maldoc delivery brings flurry of infostealers“: we’ve tracked an actor creating a new type of malicious Office document.
To help with the automatic analysis of all the maldocs produced by this actor (several per day), I added new features to existing tools and created new tools.
I’m releasing this work in the coming months (some has already been published: oledump.py and zipdump.py).
