NEW YOUTUBE VIDEO on the forensic analysis of executables, image and document files, using different open source tools:
https://youtu.be/_ttnwLSt2P8

#DigitalForensics #fileforensics #fileanalysis #filemetadata

File analysis tools

YouTube

I’m happy to share a valuable tool for my fellow threat hunters and blue teams - Sweethoney, a PE file static analysis tool.

Sweethoney is a Python application designed to facilitate automated file analysis by performing comprehensive analyses of executable files and identifying potential suspicious behaviors across various alert categories. It streamlines the malware analysis process, saving time and enhancing detection capabilities.

Key features include in-depth PE analysis, detection of suspicious behaviors, security feature checks, file characteristics assessment, and a powerful string analysis tool that extracts and analyzes strings from executable files to detect potential indicators of compromise (IoCs). Additionally, it leverages OpenAI’s GPT-3.5 Turbo model to understand the purpose of APIs and their potential security implications.

Indicators of Compromise (IoC) (via regular expressions) include IPv4/IPv6 addresses, URLs, Windows Registry keys, HTTP user agents, email addresses, Windows services, common malware commands, and more. (See fileUtils.py for the complete list)

Using OpenAI’s powerful language model, Sweethoney provides valuable insights for assessing potential security risks and vulnerabilities, enhancing cybersecurity efforts.

A big thank you to my friends and colleagues who provided insights and suggestions over the years to make this tool better!

Check out the project on GitHub (https://github.com/schwartz1375/sweethoney) and contribute to making cyberspace safer for everyone!

#cybersecurity #threatdetection #fileanalysis #opensource #openai #tool

GitHub - schwartz1375/sweethoney

Contribute to schwartz1375/sweethoney development by creating an account on GitHub.

GitHub

📢 New blog post alert! 📢

Check out our latest blog post "A Deep Dive into Penetration Testing of macOS Applications (Part 2)"! 🕵️‍♀️🖥️🔍

In this post, we discuss code signing mechanisms, code signature flags, and file and memory analysis techniques and tools. 💻🔒💡

Learn how to identify potential vulnerabilities and strengthen your macOS application security! 💪

Read the full article here: https://www.cyberark.com/resources/threat-research-blog/a-deep-dive-into-penetration-testing-of-macos-applications-part-2

#macOS #cybersecurity #pentesting #infosec #blogpost #appsecurity #hardenedruntime #entitlements #fileanalysis #memoryanalysis #securityresearch

A Deep Dive into Penetration Testing of macOS Applications (Part 2)

Introduction This is the second part of the “A Deep Dive into Penetration Testing of macOS Application” blog series. In the first part, we learned about macOS applications and their structure and...

Got a SOC? Need to analyze any file? Explore a mobile app? Binary reversing? Try our advanced File Threat Intelligence Platform. Assess files the right way. [email protected] #FileAnalysis #threathunting #threatintelligence #Cybersecurity #BlueTeam https://vulnex.com/en/binsecsweeper.html
VULNEX - Products - BinSecSweeper

Our File Threat Intelligence Platform gives you insight of file threats: vulnerabilities, malware indicators, IOC, YARA, similarities, file decomposition and more! Ask [email protected] #FileAnalysis #CyberSecurity #threatintel #BlueTeam #ThreatHunting @BinSecSweeper
Got a SOC? Need DevSecOps? Our File Threat Intelligence Platform can help. Assess files as never seen before! Ask demo [email protected] #FileAnalysis #CyberSecurity #ThreatHunting #threatintel #AppSec @BinSecSweeper

The #adventOfCyber from #tryhackme Day 7 is here! A good day about #fileAnalysis with #cyberChef.

Take some time for #hacking #education and #infosec this season! Treat yourself to #knowledge!

#happyHackyDays #hackyHolidays #THM