TechAnarchy

?

Channel Reputation Rank

#912
?

Activity Status

Stale

last updated

According to the data and stats that were collected, 'TechAnarchy' channel has quite a good rank. The feed was last updated more than a year ago. In addition 'TechAnarchy' includes a significant share of images in comparison to the text content. The channel mostly uses long articles along with sentence constructions of the basic readability level, which is a result indicating a well-balanced textual content on the channel.

About 'TechAnarchy' Channel

Tech, Tools, Security & More

? Updates History Monthly Yearly
? Content Ratio
? Average Article Length

'TechAnarchy' provides mostly long articles which may indicate the channel’s devotion to elaborated content.

short

long

? Readability Level

'TechAnarchy' provides texts of a basic readability level which can be quite comfortable for a wide audience to read and understand.

advanced

basic

? Sentiment Analysis

'TechAnarchy' contains texts with mostly positive attitude and expressions (e.g. it may include some favorable reviews or words of devotion to the subjects addressed on the channel).

positive

negative

Recent News

Unfortunately TechAnarchy has no news yet.

But you may check out related channels listed below.

Inetsim and IP addresses

[...] . Once your done if you want to remove these entries just enter the following. and As usual questions queries comments below. [...]

Kippo-Graph Updated

[...] .   Install & Configure Kippo Install & Configure Kippo Graph   As usual questions queries comments below [...]

Malware Sample Configuration Extractor

[...] ,  Stick a Fork in the Git (when I release it), Mail me on msce@techanarchy.net or as usual Questions Queries Comments below. [...]

AdWind Rat Analysis

[...] and any data stored in the DB is likely to be destroyed when it goes live. As usual questions queries comments below. [...]

Extracting Configurations From Malware Samples

[...] jRat here is an article I wrote for eForensics Magazine: Extracting Network Signatures from malware samples, jRat a case study. The basic premise was to identify how the protocol worked. Once you have [...]

Viper in the browser

[...] to have a play, I am running a free Web instance that has been pre loaded with a handful of malware samples. Most of the functionality is in place, Some was removed for the sake of security. On that [...]

Setting up a malware Zoo with VXCage

[...] As with most things in life there are a variety of methods that can be used for storing malware samples, each with their own set of pros and cons. Lets start with the where. Your malware needs to [...]

Welcome to 2015

[...] , instead I am going to look from an Incident Response perspective. Identify IOC’s from malware samples so you know what to look for on your estate. Use host based analysis to identify compromised [...]

MalwareConfig

[...] victim contains a lot of information hardcoded inside the malware itself. Typically these configuration settings are obfuscated or encrypted so they are not immediately accessible, but they still have [...]

Decoding NanoCore Rat

[...] file we see clear text strings including our domain name and other settings indicative of configuration settings. I repeat the test against a couple more samples and everything looks great until . . . [...]

RAT Decoders

[...] on GitHub that will hold a collection of Python Scripts that will extract and decode the configuration settings from common rats. Each of these decoders is already running on http://malwareconfig.com [...]

EnCase And AnalyzeMFT

[...] no errors. Ok now we have the python bit installed lets see about getting it into EnCase. The Python Script In this instance we don’t need to make any modifications to our script we just need it [...]

Update to Image Mount Script

[...] Several Months ago I wrote a python script that helped me mount Disk and partition images. You can read the original post here. It worked [...]

Extracting Configurations From Malware Samples

[...] and detectors of APT tradecraft. Before i discovered the ChopShop Toolset i was working on a python script that if provided with compromised network traffic would allow you to view the actions that [...]

Malware Sample Configuration Extractor

[...] these configurations. Currently and somewhat unimaginatively named as the “Malware Sample Configuration Extractor” it is capable of extracting Configs from the following: Supported Malware Bozok [...]

AdWind Rat Analysis

[...] and its contents used to install / configure and launch the RATs main program. Malware Sample Configuration Extractor Because the RAT uses a hardcoded password in all V1 and V2 variants once we have [...]

Home IDS with Snort And Snorby

[...] to identify it as a different sensor and you should be good to go. You dont need to run the Snorby install or configuration. As usual Questions Queries Comments below. [...]

MalwareConfig

[...] I wanted a more static approach that would be easier to implement and scale nicely The Config The malware that is delivered to the victim contains a lot of information hardcoded inside the malware [...]

Home IDS with Snort And Snorby

[...] traffic at two seperate points. One protecting my home network the other connected to my malware lab which helps me write rules and identify malware based on its traffic. Both sensors report in to [...]

Welcome to 2015

Hello and welcome to 2015. Hope you all had a great Christmas and a Happy New Year. As I said in my last post of 2014 this year I plan to get more [...]

?Key Phrases
Inetsim and IP addresses

[...] . Once your done if you want to remove these entries just enter the following. and As usual questions queries comments below. [...]

Kippo-Graph Updated

[...] .   Install & Configure Kippo Install & Configure Kippo Graph   As usual questions queries comments below [...]

Malware Sample Configuration Extractor

[...] ,  Stick a Fork in the Git (when I release it), Mail me on msce@techanarchy.net or as usual Questions Queries Comments below. [...]

AdWind Rat Analysis

[...] and any data stored in the DB is likely to be destroyed when it goes live. As usual questions queries comments below. [...]

? Locations

Related channels