Click here to download all references as Bib-File.•
2024-03-24
⋅
Viuleeenz
⋅
Understanding API Hashing and build a rainbow table for LummaStealer Lumma Stealer |
2024-02-04
⋅
Viuleeenz
⋅
Understanding PEB and LDR Structures using IDA and LummaStealer Lumma Stealer |
2023-12-20
⋅
Viuleeenz
⋅
Applied Emulation - Decrypting Ursnif strings with Unicorn Gozi |
2023-11-15
⋅
Viuleeenz
⋅
Applied Emulation - Analysis of MarsStealer Mars Stealer |
2023-10-25
⋅
Viuleeenz
⋅
Vidar - payload inspection with static analysis Vidar |
2023-08-29
⋅
Viuleeenz
⋅
Agent Tesla - Building an effective decryptor Agent Tesla |
2023-06-27
⋅
Viuleeenz
⋅
IDA-Python - Locate a function independently from its offset |
2023-05-08
⋅
Viuleeenz
⋅
Extracting DDosia targets from process memory Dosia |
2023-03-14
⋅
Viuleeenz
⋅
Dynamic Binary Instrumentation for Malware Analysis Gozi |
2019-09-02
⋅
Viuleeenz
⋅
Manually unpacking of packed executable |