Posts By: malwrforensics

Linux uses a swap partition, that represents the system’s virtual memory. The swappiness represents how often the system will copy stuff from RAM to disk/virtual memory. The more RAM you have, the less you need to copy to disk and by setting the swappiness to a lower value will result in an overall speed increase…. Read Article →

This is a script developed in python to extract forensic artefacts from a file/memory dump. It’s useful to run it after you’ve gone past the obfuscation layer(s) and reached the decrypted code/data/strings. It can extract filenames, registry keys, urls, e-mail addresses, IPs, etc. The data is logged to different text files, one for each category…. Read Article →

This script can generate fuzzing files with valid AVI/BMP/CUE/GIF/JPG/PDF/PNG headers. The body can be a constant set of characters or random characters (useful to determine the offset when the program crashes). The code is available on github. You can download it from here.

This script can be used to do fuzzing against an FTP server. It supports the following commands: ABOR ACCT ALLO APPE CWD DELE DIR FORM GET HELP LIST MACDEF MDELETE MDIR MGET MKD MLS MODE MODETIME MPUT NEWER NLST NMAP MTDM NTRANS PUT RECV REGET REMOTEHELP REMOTESTATUS REST RESTART RETR RMD RNFR RNTO QUOTE SEND… Read Article →

This script can be used to do fuzzing against an HTTP server. It supports the following commands: Request type Page Protocol Host Referrer Content type User agent Cookie Content length The code is available on github. You can find it here.

Scroll To Top