Homepage
Open in app
Sign in
Get started
Security Break
Some posts about security, malware, reverse engineering
Reversing Tips
Malware Analysis
MakerBreak
Other
Home
Follow
Following
Security infographics
Security infographics
I often do infographics to share security concepts or best practices. This page will list the different files. I’ll update it periodically…
Thomas Roccia
Aug 29, 2020
Fifty Shades of Malware Strings
Fifty Shades of Malware Strings
When analysing malware, string extraction is one of the first things to do to briefly extract useful information such as IP address…
Thomas Roccia
Jul 24, 2020
Fifty Shades of Malware Hashing
Fifty Shades of Malware Hashing
In forensic investigation as well as malware research, hashing is one of the most prevalent techniques to identify a file as malicious or…
Thomas Roccia
Sep 29, 2019
Introducing Yara Toolkit
Introducing Yara Toolkit
Your One Stop for All Things Yara!
Thomas Roccia
Jan 7
#100DaysOfYara Challenge
#100DaysOfYara Challenge
The 100 Days of Yara is a fun challenge created by Greg Lesnewic and inspired by the 100 Days of Code which I did couple year ago.
Thomas Roccia
Dec 31, 2023
Applying LLMs to Threat Intelligence
Applying LLMs to Threat Intelligence
A Practical Guide with Code Examples
Thomas Roccia
Nov 3, 2023
The Intel Brief by SecurityBreak
The Intel Brief by SecurityBreak
An LLM Experiment
Thomas Roccia
Sep 26, 2023
Investigation of a targeted attack in the CryptoCurrency field
Investigation of a targeted attack in the CryptoCurrency field
I investigated a campaign targeting the cryptocurrency industry. I wrote a detailed report that includes TTP, IOC and more. This thread was…
Thomas Roccia
Dec 29, 2022
My Jupyter Collection
My Jupyter Collection
I work with Jupyter notebook on a daily base for analysis, threat intelligence and creating workflows! I created a Github page to share…
Thomas Roccia
Dec 28, 2022
Dhash Icon
Dhash Icon
Identify similar icons used in malware
Thomas Roccia
Dec 26, 2022
Code Graphology
Code Graphology
How to study an exploit to discover more?
Thomas Roccia
Dec 20, 2022
6 Useful Infographics for Threat Intelligence
6 Useful Infographics for Threat Intelligence
Visualizing Cybersecurity concepts can be a terrific way to learn more about specific tools, methodologies, and techniques! Here is a post…
Thomas Roccia
Dec 17, 2022
10 Underrated Resources about Malware Techniques
10 Underrated Resources about Malware Techniques
This is a list of various resources to learn more about malware techniques, how to analyse them and how to improve your detection! This…
Thomas Roccia
Dec 16, 2022
[Reverse Engineering Tips] — IDA Pro Shortcut Cheat Sheet
[Reverse Engineering Tips] — IDA Pro Shortcut Cheat Sheet
This is short post to keep a track of the IDA shortcut cheat sheet available here. Happy reversing! :)
Thomas Roccia
Jun 12, 2022
10 Python Libraries for Malware Analysis and Reverse Engineering
10 Python Libraries for Malware Analysis and Reverse Engineering
With code example!
Thomas Roccia
Jun 7, 2022
External References
External References
This page serves as a record of my external endeavors, including writing blogs, conducting research, presenting at conferences, and…
Thomas Roccia
May 9, 2022
[Reverse Engineering Tips] — Unpacking InnoSetup
[Reverse Engineering Tips] — Unpacking InnoSetup
To deliver an application, developers can use Windows installers. Windows installers are software components used for installing…
Thomas Roccia
Mar 14, 2022
My Top Books to Learn Malware Analysis and Reverse Engineering
My Top Books to Learn Malware Analysis and Reverse Engineering
I often get messages from people wanting to learn more about reverse engineering and malware. I always refer to the same books and I though…
Thomas Roccia
Feb 21, 2022
Log4Shell Visualization
Log4Shell Visualization
The Log4Shell (CVE-2021–44228) is a zero-day vulnerability in Log4j a Java logging framework, which has been released in December 2021…
Thomas Roccia
Dec 21, 2021
[Reverse Engineering Tips] — Extracting MSU file
[Reverse Engineering Tips] — Extracting MSU file
To understand a vulnerability, it is sometimes useful to study the patch and compare it to see what has changed. On the Windows…
Thomas Roccia
Dec 9, 2021
3D Printing Industrial Control System Simulation
3D Printing Industrial Control System Simulation
This article is a repost from the McAfee website. I wrote this during my time at McAfee Labs in the Advanced Threat Research team. It is an…
Thomas Roccia
Nov 26, 2021
[Reverse Engineering Tips] — Enumerators
[Reverse Engineering Tips] — Enumerators
When doing reverse engineering, it is important to understand the data structures that can be used by a program. Being able to reconstruct…
Thomas Roccia
Nov 25, 2021
[Reverse Engineering Tips] — Run-Time Type Identification
[Reverse Engineering Tips] — Run-Time Type Identification
Run-time type information (RTTI) is a feature of C++ that allows the determination of an object data type at runtime (runtime, or…
Thomas Roccia
Mar 19, 2021
[Reverse Engineering Tips] — Name Mangling
[Reverse Engineering Tips] — Name Mangling
Name mangling is a mechanism used by compilers to add additional characters to functions with the same name (function overloading). The…
Thomas Roccia
Mar 12, 2021
[Reverse Engineering Tips] — Strings Deobfuscation with FLOSS
[Reverse Engineering Tips] — Strings Deobfuscation with FLOSS
Deobfuscation is an important part of malware analysis. Many malware currently uses obfuscation to hide from analysts but also to avoid…
Thomas Roccia
Feb 5, 2021
[Reverse Engineering Tips] — Binary Diffing
[Reverse Engineering Tips] — Binary Diffing
Binary diffing is a great way to visualize and spot differences in multiple samples. As a malware researcher, this is useful for…
Thomas Roccia
Jan 23, 2021
[Reverse Engineering Tips] — IDA Python
[Reverse Engineering Tips] — IDA Python
One of the greatest features of IDA is the ability to use Python directly in the interface to manipulate the disassembly code. IDAPython…
Thomas Roccia
Jan 8, 2021
[Reverse Engineering Tips] — Kernel Debugging on Windows 10
[Reverse Engineering Tips] — Kernel Debugging on Windows 10
The Windows kernel allows the operating system to interact with the hardware and system resources of the computer. It runs the code in a…
Thomas Roccia
Dec 4, 2020
About SecurityBreak
Latest Stories
Archive
About Medium
Terms
Privacy
Teams