$ cat about.txt
UC3M Cybersecurity students webpage, here you’ll find our research posts, papers…
$ cat team.txt
- Fare9
- farenain9(at)gmail(dot)com
- https://github.com/Fare9
- https://k0deless.github.io/bios/fare9/
- https://twitter.com/Farenain
- Sc4reCr0w
- jorsanfre(at)gmail(dot)com
- https://github.com/L0M1S
- https://k0deless.github.io/bios/Sc4reCr0w/
- 90n20
- 90n20 at protonmail dot ch
- https://github.com/90n20
- https://twitter.com/90n20sec
- sarvmetal
- santiago.infsec(at)gmail(dot)com
- https://github.com/santiagorocha
- https://twitter.com/sarvmetal
$ cat projects.txt
- RicardoNarvaja C++ Exercise 1 - First Ricardo Narvaja's C++ Exploiting Exercise: analysis, executable and exploit - Fare9
- RicardoNarvaja C++ Exercise 2 - Second Ricardo Narvaja's C++ Exploiting Exercise: analysis, IDA database, executable and exploit - Fare9
- Exercise 1 Exploiting in x64 Ricardo Narvaja - First exercise in x64 of Ricardo Narvaja with ASLR and DEP - Fare9
- Exercise 2 Exploiting in x64 Ricardo Narvaja - Second exercise in x64 of Ricardo Narvaja with ASLR and DEP - Fare9
- Challenge CrackLatinoS for ekoparty 2018 - Exploiting challenge to get a ticket for ekoparty 2018, the challenge was to exploit a vulnerable driver - Fare9
- DSTN Crackme 2 - Analysis, solution and notes about DSTN emulator - Fare9
- Analysis of Genaytik VM - My notes about Genaytyk VM crackme - Fare9
$ cat malware_analysis.txt
- Analysis of Lab03-03.exe from Practical Malware Analysis - Analysis of Lab03-03.exe from Practical Malware Analysis book for the class of Malware Analysis & Engineering of UC3M
- Quick analysis of OperationHidenPython - Just a simple analysis of the sample Desktop.ini.exe, generating code with Empire shouldn't be considered as a good approach for malware...
- System modifications made by BabyShark loader - Some decrypted strings and the system modifications that BabyShark loader does to the system.
- Analysis of Azorult - A little and quick analysis of an Azorult Sample, due to lack of time and technical problems the analysis is not complete as I would like
$ cat tools.txt
- ANBU - Automatic binary unpacker implemented with DBI Framework Intel PIN
- Windows Shellcode for x64 - Shellcode for Windows x64 to execute a calc.exe with WinExec, this one has nothing hardcoded
- Windows Internals - Commented versions of code that I read from rootkits/windows internals books
- Practical Binary Analysis Tools - My own versions from the programs of the book Practical Binary Analysis
$ cat talks.txt
- Scraping Online Hacking Forums for CTI at IntelCon by Ginseg
$ cat posts.txt
- KUNAI Static Analysis :: en
- Introduction to Reverse Engineering :: en
- Analysis YANSOllvm :: en
- Advanced Programming in the UNIX Environment :: en
- PE File Format :: en
$ cat articles.txt
- Notes about ptrace syscall wrapper :: en
- Notes about the ELF file format :: en
- Kage no Kotoba Stego Tool (https://github.com/K0deless/APT-Stego-Assignment) :: en
- Analysis of Turla, DragonFly (incl. 2.0) and Quedagh :: en
$ cat publications.txt
Trouble Over-The-Air: An analysis of FOTA Apps in the Android Ecosystem :: A systematic analysis of FOTA software in Android Phones.
Eduardo Blázquez, Sergio Pastrana, Álvaro FEAL, Julien GAMBA, Platon Kotzias, Narseo VALLINA-RODRÍGUEZ, Juan Tapiador.
42nd IEEE Symposium on Security and Privacy. March 2021