MySuntikanAPI

MyCERT have been developing a few analysis tools for reversing. MySuntikanAPI is still in alpha version and need more improvement. Every hooked API will capture detail information to make sure we don’t miss any behavior especially in malware sample. API Hooking is same as IAT hooking. One of the tools that we created is called […]

Posted on 04/01/2010 by Kamil Alta in analysis, malware | Tagged api, automated analysis, hooking, malware, programming, tools | Leave a comment

Pages

  • About

Tweets by @mycert

Archives

  • September 2022
  • November 2021
  • January 2019
  • November 2018
  • October 2018
  • January 2018
  • December 2015
  • November 2015
  • October 2015
  • August 2014
  • May 2014
  • April 2014
  • February 2014
  • April 2011
  • January 2011
  • December 2010
  • November 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • March 2010
  • February 2010
  • January 2010
  • December 2009
  • November 2009
  • October 2009
  • September 2009
  • July 2009
  • March 2009

Categories

  • 0-day
  • analysis
    • Phishing
  • Android
  • Development
    • Database
    • MySQL
  • dionaea
  • Honeypot
  • LebahNET
    • Statistic
  • Log
  • malware
    • PDF
  • Malwr
  • Scripting
  • Uncategorized
  • Web security
    • php

Recent Comments

  • fatah on MyCERT PCAP Analyzer
  • saurabh on MyCERT PCAP Analyzer
  • eis on LebahNET Statistic – September 2015
  • Fikri Fadzil on Dionaea: Malwr Module
  • ahmad on Forensic Challenge 2010/6 – Analyzing Malicious Portable Destructive Files is now live
Copyright © Blog Honeynet CyberSecurity Malaysia 2023. WordPress theme by Ryan Hellyer.