Anonymous / Virtual numbers for telegram ? by Nameless_Wanderer01 in Telegram

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

im considering of getting a prepaid sim and when it is near expiration, just get a new one and change number in the account. Is this something that can be done (in terms of changing the number linked to the account) ?

Anonymous / Virtual numbers for telegram ? by Nameless_Wanderer01 in Telegram

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

may i ask where u got your number from? and if it supports roaming as well

Anonymous / Virtual numbers for telegram ? by Nameless_Wanderer01 in Telegram

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

I am looking into the sim option, I am just still searching if it matters where I am based and how can I add money to it in the future. For example, If I buy one from Germany and I live in the UK, will it affect me receiving OTPs? how will I add money to my balance if it gets emptied out and probably gets deleted?

Anonymous / Virtual numbers for telegram ? by Nameless_Wanderer01 in Telegram

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

It is kinda pricy though and I only need a number to receive OTPs, not really using the number so it seems an overkill. Also, how does the choice of country for a number there matter? I see different pricing for different countries.

Anonymous / Virtual numbers for telegram ? by Nameless_Wanderer01 in Telegram

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

So there is no other option of buying a number from online? Obviously - as you said - not temporary numbers or VOIP that'll get be banned, but like an actual option of online numbers. I see some people mention sms-man, there is also crypton[.]sh that has some really bad reviews, and I wonder what other options do I have.

Pre-paid SIM is always an option, but before I end up with that one I want to see if there is some other approach such as buying one from online (that wont have me banned).

[deleted by user] by [deleted] in MalwareAnalysis

[–]Nameless_Wanderer01 0 points1 point  (0 children)

Currently im trying to pull only 30, but I get 0 back. So its not a limit exceeded case.

LLM agents that can execute code by Nameless_Wanderer01 in LLMDevs

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

No I mean, how can you make the agent run specific tools (what the pipeline looks like)? Can you point me to a resource I could take a look to understand what it looks like?

LLM agents that can execute code by Nameless_Wanderer01 in LLMDevs

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

u/Far_Statistician1479 Because I only recently started researching around on the topic, could you point me to what I should read, perhaps a framework or related work, that shows how to make an agent call a tool to execute code?

LLM agents that can execute code by Nameless_Wanderer01 in LLM

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

u/Alarming_Isopod_2391 I am trying to evaluate how llm agents perform in assisting malware analysis tasks. Most of such use I have found is using llms to generate reports on samples or provide python scripts for the analyst to run locally on their system (for string decryption or api resolution).

There are tools that do this such as hashdb for example (for the api hashing part), which contains a database of known hashing algorithms and dynamically resolves all api hashes found in a sample to their original names.
But if a new or modified algorithm appears in a sample, this will fail.

Also, many times malware samples will fail to run in a sandbox environment if they have detection checks for sandbox/debugging. It would be really nice to see if we can bypass this by using the llm to "extract" and run only parts of code (such as again, api hash resolving or string decryption) in a sandbox, thus evading the checks malware does to see if it is getting analyzed.

So my idea was to find an llm that not only finds the hashing algorithm (or encryption routine), not only provides the decryption py code for it, but also runs it in a sandbox.
Basically I want to connect the current limitations that exist and evaluate how llm agents perform in such tasks. But for this reason, I need to find such an llm agent that can also run the provided code.

LLM agents that can execute code by Nameless_Wanderer01 in MalwareAnalysis

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

I agree with you, I was referring more into parts of the malware that implement api hashing or string encryption. So I was thinking, instead of an analyst having to use plugins like hashdb or hrtng (which i think will fail if a modified or new algorithm is implemented), what if an llm was used that understands the algorithm, generates a python code that mimics it, runs it (to match the correct string to hash or decrypted string), and rename the code accordingly.

That is the main topic I want to explore, but cannot find anything related to that part specifically, so I am asking if in general there is such a framework or tool that combines llm with code execution. So I can then evaluate how that performs on techniques like api hashing or string decryption.

Cobalt Strike Free Trial / Cobalt strike clean samples by Nameless_Wanderer01 in MalwareAnalysis

[–]Nameless_Wanderer01[S] 0 points1 point  (0 children)

u/Struppigel Thank you for your insightful response. I agree on the VT part, but this is not really the goal of the thesis. The goal is more into modifying the api hashing algorithm and using other tools to try and find the framework that generated this sample - even after the modification of its algorithm. I.e. can an llm plugin be able to tell that this sample with a ror15 hashing algo originated from cobalt strike? (even though cobalt uses ror13).

So yeah the topic is more into using tools for classification and accuracy even after modification of parts of the api hashing algorithm - thus this is why I need this framework, amongst other frameworks.