By Anonymous | October 27, 2015 - 19:31 | Posted in AnonyNews | 1 Comment

`.–.“ .+#+antisec #ant:` .isec #antisec:+ #antis- -ec #/. antise. /c #an- tis+. /ec-. #a `.nt/ `/:is` .ec/ #a- -nt/ .::::.` .ise+ `c #` -ant .is: `/ec #anti+ .sec+ + #an- tis+ :ec. ` #antisec #a ntis .ec: #: `ant- +is /ec #antisec `#an` ti/`:se `c #a::-. nt: `isec #antise..` .c # `:/an- +tisec #antisec: #+ Read more » 



This is an introduction to the distro called REMnux: A Linux Toolkit for Reverse-Engineering and Analyzing Malware. – https://twitter.com/ro0ted/ What can you do with REMnux? Examine browser malware Analyze malicious document files Extract and decode suspicious artifacts Handle laboratory network interactions Review multiple malware samples Examine properties and contents of suspicious files Investigate Linux and Windows Read more » 


 2 Users Online