Click here to download all references as Bib-File.•
2025-08-07
⋅
abuse.ch
⋅
MalwareBazaar | SHA256 c1d781f4c9469977a32f2ad6edea4fda98e6a8eda5aa10149be2311cb369c48a (XTinyLoader) XTinyLoader |
2025-08-06
⋅
Silent Push
⋅
Unmasking SocGholish: Silent Push Untangles the Malware Web Behind the “Pioneer of Fake Updates” and Its Operator, TA569 FAKEUPDATES MintsLoader Parrot TDS Parrot TDS WebShell Raspberry Robin |
2025-08-05
⋅
Defentive
⋅
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT Ghost RAT |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of Word Document Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of DLL Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of PDF Document Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
One Click and You're Caught: HoneyFiles in Action |
2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Fast Flux Techniques |
2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Domain Generation Algorithm |
2025-08-03
⋅
Reverse The Malware
⋅
Gathering Indicators of Compromise Through Malware Datasets. |
2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
2025-08-01
⋅
Nextron Systems
⋅
Plague: A Newly Discovered PAM-Based Backdoor for Linux |
2025-08-01
⋅
Reverse The Malware
⋅
SHA-256 C2 ( Command and Control Server ) Hashes |
2025-08-01
⋅
Reverse The Malware
⋅
Command and Control Server ( C2's ) Hashes |
2025-08-01
⋅
Reverse The Malware
⋅
Awesome C2 Panel Favicon Hashes |
2025-08-01
⋅
Reverse The Malware
⋅
Internet Search Engine Queries for Identifying C2 Panels |
2025-08-01
⋅
Reverse The Malware
⋅
Threat Hunting with 20 Urlscan.io Search Queries |
2025-08-01
⋅
Reverse The Malware
⋅
Feeds of Indicators Of Compromise ( TweetFeed ) |
2025-08-01
⋅
Medium RaghavtiResearch
⋅
https://medium.com/p/862eea4a2db4 |
2025-07-31
⋅
Reverse The Malware
⋅
SysTracer: Another Suite for Digital Forensics and Incident Response |