Daniel Plohmann

513 posts

Daniel Plohmann banner
Daniel Plohmann

Daniel Plohmann

@push_pnx

Reverse Engineering & Malware Research @Fraunhofer_FKIE. Projects: @Malpedia, DGArchive, MCRIT, SMDA, ApiScout, IDAscope.

DE เข้าร่วม Temmuz 2011
184 กำลังติดตาม4.5K ผู้ติดตาม
Daniel Plohmann
Daniel Plohmann@push_pnx·
@angealbertini Malcat has been my initial malware triage tool for a good while now and saved me a decent amount of time combining and accelerating several common tasks. 100% what Ange said.
English
0
1
9
1.9K
Daniel Plohmann รีทวีตแล้ว
Ange
Ange@angealbertini·
If you’re into malware analysis, you should really give Malcat a try. It’s an all-in-one tool with hex and structure views, disasm and decomp, integrated Yara, python scripting and similarities scanning... A very handy and well-designed time saver!
English
1
22
129
12.8K
Daniel Plohmann รีทวีตแล้ว
Hunt.io
Hunt.io@Huntio·
From building Malpedia to tracking malware families at scale, Daniel Plohmann @push_pnx is shaping how we fight cyber threats. hunt.io/blog/interview… In this Hunt interview, he shares insights from his research at Fraunhofer FKIE and how music fuels his creativity in security. Read the full conversation and see how Daniel connects technical expertise with artistic passion ⬇️ #CyberSecurity #ThreatIntelligence #CyberThreats
English
0
12
25
3.8K
Daniel Plohmann รีทวีตแล้ว
Scoubi
Scoubi@ScoubiMtl·
Tickets for #DEATHcon in Montreal are on sale now! Book now to secure your place. FYI, Virtual Tickets for round 1 are already Sold Out! eventbrite.ca/e/deathcon-mon… Additional info (like workshops) for the con can be found here : DEATHcon.io Please retweet for reach
English
0
11
11
4K
Daniel Plohmann รีทวีตแล้ว
DEATHCon
DEATHCon@DEATHCon2025·
DEATHCon online/remote ticket sale round 1 will start Monday 7th of July at 00:01 UTC! worldtimebuddy.com/?pl=1&lid=100,… Last year they sold out in 24h 😳 On-site tickets will be available on 7/7 at around 10am local time for each site. All details here: deathcon.io/tickets.html
GIF
English
4
12
29
5.8K
Daniel Plohmann รีทวีตแล้ว
Malcat dev
Malcat dev@malcat4ever·
You can now check your strings in #malcat against an online library of #Malpedia FLOSSed strings. Just copy this plugin, courtesy of @push_pnx : #plugin-for-malcat" target="_blank" rel="nofollow noopener">github.com/malpedia/malpe…
Malcat dev tweet media
English
0
27
95
6.4K
Daniel Plohmann รีทวีตแล้ว
Bogdan Cebere
Bogdan Cebere@BCebere·
🔍 Looking for better detection models for Domain Generation Algorithms (DGA)? 🚀 In our new @RAID_Conference paper, we review a some assumptions that can limit the impact of the DGA detection models and discuss some improvements that can lead to more robust detection models.
Bogdan Cebere tweet media
English
1
3
6
723
Daniel Plohmann รีทวีตแล้ว
DEATHCon
DEATHCon@DEATHCon2025·
Ticket pre-sales for DEATHCon 2024 are now live! If you attended last year, please see the #announcements channel in Slack. If you aren't still on Slack, DM me and I'll get you the info!
English
2
15
18
4.6K
Daniel Plohmann รีทวีตแล้ว
Bernardo Quintero
Bernardo Quintero@bquintero·
🎉 HUGE thank you to the incredible VirusTotal community! We're turning 20 & feeling so grateful for your support over the years. 🙌 Check out our blog for what industry leaders are saying & maybe score some cool swag? #VirusTotal20Years ➡️ blog.virustotal.com/2024/05/we-mad…
Bernardo Quintero tweet media
English
7
38
188
28.2K
Daniel Plohmann รีทวีตแล้ว
Malcat dev
Malcat dev@malcat4ever·
We have released #malcat version 0.9.6, which comes with a new #malware identification service: #Kesakode! ● Works on unpacked malware ● 2000+ malware families & millions of clean + libs in DB ● Only hashes are sent ● Included in Malcat full & pro malcat.fr/blog/096-is-ou…
English
0
20
44
11.6K
vx-underground
vx-underground@vxunderground·
In less than 24 hours we will officially be 5 years old. We are giving away $1,000 worth of our "5 horsemen of the apocalypse" shirt. If you'd like a free shirt leave a comment below.
vx-underground tweet media
English
2.5K
169
2.2K
186.8K
Daniel Plohmann
Daniel Plohmann@push_pnx·
@hyun____22 Don't get me wrong, Hyara on itself is an awesome tool and I've used it many times in IDA! :) But its also a great blueprint for the different tools and I'm glad you spent all the effort to adapt it to the others!
English
0
0
0
117
Hyun Yi
Hyun Yi@hyun____22·
@push_pnx I'm glad you found my project helpful. :)
English
1
0
3
145
Daniel Plohmann รีทวีตแล้ว
Danny Quist
Danny Quist@OpenMalware·
Updated Reverse Engineering Go Malware talk with readable slides so you can read them. Many thanks to @yuriskinfo for fixing it youtube.com/watch?v=ftUvYR…
YouTube video
YouTube
English
1
15
67
5.6K
Daniel Plohmann รีทวีตแล้ว
Malpedia
Malpedia@malpedia·
📣We updated "Malpedia FLOSSed". TL;DR: More data, cleaner Rust/Go/Dotnet strings, various tags! We also created a public web service to make this data more accessible: strings.malpedia.io, as well as an IDA plugin as a demo use case. Read more -> github.com/malpedia/malpe…
Malpedia tweet mediaMalpedia tweet mediaMalpedia tweet media
English
1
20
60
15.8K
Daniel Plohmann
Daniel Plohmann@push_pnx·
@albertzsigovits Haha, that's a very nice use of the file! I've had a quick look and it seems there are more such debug message indicators that you could also use: [!], [#], [*], [+], [-], [E], [I], [S], [~].
English
1
0
3
206
Albert Zsigovits
Albert Zsigovits@albertzsigovits·
I feel like this dump doesn't get enough credit. So I filtered all malware debug ascii/utf16 strings from it and included it in a YAR rule file. That's just one use-case for this awesome dump. There are lots of other interesting malware indicators in it that could be used in a different way. @malpedia @push_pnx #100DaysofYARA #malpedia
Albert Zsigovits tweet media
Malpedia@malpedia

🛠️ We just published "Malpedia flossed": @Mandiant FLARE team's floss tool applied to all unpacked + dumped samples in @malpedia. Results: 35.645.324 raw strings, distilled to 2.137.276 unique strings from 1751 processed malware families - 400 MB JSON. -> github.com/malpedia/malpe…

English
4
8
21
5.2K
Daniel Plohmann
Daniel Plohmann@push_pnx·
@AzakaSekai_ @malpedia @Mandiant An example: you look at some new/unknown malware sample and extract strings for it. You can now cross-reference these strings against this collection to figure out how common they are, i.e. create a weighted order for the least common / most interesting ones.
English
1
0
1
110
Malpedia
Malpedia@malpedia·
🛠️ We just published "Malpedia flossed": @Mandiant FLARE team's floss tool applied to all unpacked + dumped samples in @malpedia. Results: 35.645.324 raw strings, distilled to 2.137.276 unique strings from 1751 processed malware families - 400 MB JSON. -> github.com/malpedia/malpe…
Malpedia tweet media
English
3
56
138
19.4K