Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-01-08YouTube (Embee Research)Embee_research
Malware Analysis - Simple Javascript Decoding and C2 Extraction (Redline Stealer)
RedLine Stealer
2024-01-08YouTube (Embee Research)Embee_research
Javascript Malware Analysis - Decoding an AgentTesla Loader
Agent Tesla
2024-01-08YouTube (Embee Research)Embee_research
Malware Analysis - Decoding Obfuscated Powershell and HTA Files (Lumma Stealer)
Lumma Stealer
2024-01-07nikhilh-20Nikhil Hegde
INC Linux Ransomware - Sandboxing with ELFEN and Analysis
INC
2024-01-06kienmanowar Blogm4n0w4r, Tran Trung Kien
[QuickNote] Technical Analysis of recent Pikabot Core Module
Pikabot
2024-01-05IBMIBM X-Force Exchange
Tomb Crypter and ChrGetPdsi Stealer Analysis Report (INT00011701)
Broomstick ChrGetPdsi Stealer
2024-01-01SekoiaQuentin Bourgue
Tycoon 2FA: an in-depth analysis of the latest version of the AiTM phishing kit
2023-12-28AhnLabSanseo
Trend Analysis on Kimsuky Group’s Attacks Using AppleSeed
AlphaSeed Appleseed
2023-12-26Github (VenzoV)VenzoV
Pikabot Loader analysis, round 2!
Pikabot
2023-12-20ThreatMonKerime Gencay
GhostLocker Ransomware Analysis Report (Paywall)
GhostLocker
2023-12-18Medium (Cryptax)Axelle Apvrille
Organizing malware analysis with Colander: example on Android/WyrmSpy
WyrmSpy
2023-12-13StairwellSilas Cutler
Kuiper ransomware analysis: Stairwell’s technical report
2023-12-08Twitter (@embee_research)Embee_research
Ghidra Basics - Manual Shellcode Analysis and C2 Extraction
Cobalt Strike
2023-12-01GeniansGenius Security Center
Cases of attacks disguised as North Korean market price analysis documents, etc. CVE-2022-41128 vulnerability called with HWP, HWPX, DOCX, XLSX files
2023-12-01LianSecurityLianSecurity
BOOMSLANG Mobile fraud family analysis
2023-11-30EchoCTIBilal BAKARTEPE, bixploit
LockBit 3.0 Technical Analysis Report
LockBit
2023-11-28ANY.RUNMaksim Mikhailov
RisePro Malware Analysis: Exploring C2 Communication of a New Version
RisePro
2023-11-23Infosec WriteupsOsama Ellahi
Malware analysis Remcos RAT- 4.9.2 Pro
Remcos
2023-11-21ReliaquestJames Xiang
Scattered Spider Attack Analysis
2023-11-15ViuleeenzAlessandro Strino
Applied Emulation - Analysis of MarsStealer
Mars Stealer