Click here to download all references as Bib-File.•
2024-04-04
⋅
InfoSec Handlers Diary Blog
⋅
Slicing up DoNex with Binary Ninja Donex |
2024-02-21
⋅
Invoke RE
⋅
Automating Qakbot Malware Analysis with Binary Ninja QakBot |
2024-02-21
⋅
YouTube (Invoke RE)
⋅
Analyzing Qakbot Using Binary Ninja Automation Part 3 QakBot |
2024-02-09
⋅
YouTube (Invoke RE)
⋅
Analyzing and Unpacking Qakbot Using Binary Ninja Automation Part 2 QakBot |
2024-01-23
⋅
YouTube (Invoke RE)
⋅
Analyzing and Unpacking Qakbot using Binary Ninja Automation QakBot |
2023-04-03
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - 3CX SmoothOperator ffmpeg.dll with Binary Ninja 3CX Backdoor |
2022-07-22
⋅
Binary Ninja
⋅
Reverse Engineering a Cobalt Strike Dropper With Binary Ninja Cobalt Strike |
2018-03-20
⋅
Stormshield
⋅
De-obfuscating Jump Chains with Binary Ninja Locky |