Set TOR Exit Node – TOR Browser, Country Code, Specific Node
How to set TOR Exit Node in TOR Browser for specific Country using Country Codes or set specific Exit Node from any country and check the applied settings
How to set TOR Exit Node in TOR Browser for specific Country using Country Codes or set specific Exit Node from any country and check the applied settings
How to Check Phishing Links in Enterprise before engaging takedown with registrar. Check if link is malicious and what to do if the content isn’t available
How to Check Suspicious Links from emails or other sources for Legitimacy with Common Sense Observation and Online Tools (DNS, IP Reputation)
BIFF Command Viewer usage Guide – “BiffView++” shows the structure of older Microsoft Excel XLS file format (OLE structure / Compound File Binary container)
Learn how to use OfficeMalScanner – Microsoft Office Malware Scanner (Word / Excel / PowerPoint) for Malicious Macros, PE. Including Usage examples and tips
Malicious Hidden Excel Spreadsheets went popular lately using Excel 4 Macros. ExcelSheetUnhide Powershell script will Unhide Hidden Excel Sheets
This guide will help you setup python oletools by Decalage and show you some usage examples. Oletools are used to analyze types of Microsoft Office Files
Imphash usage can help you categorize Malware to a certain adversary or a Malware family. You will learn how to install and use imphash in Malware analysis
In this guide you will understand how to setup and use Didier Stevens oledump python tool to Extract VBA Macro from Microsoft Excel / Word / Office files
Comprehensive guide on SvcHost internals. Cyber Security Threat Analysis: how to find what hides behind it and is it malicious or a legitimate process