Click here to download all references as Bib-File.•
| 2025-08-03
⋅
Reverse The Malware
⋅
One Click and You're Caught: HoneyFiles in Action |
| 2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Fast Flux Techniques |
| 2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Domain Generation Algorithm |
| 2025-08-03
⋅
Reverse The Malware
⋅
Gathering Indicators of Compromise Through Malware Datasets. |
| 2025-08-02
⋅
cocomelonc
⋅
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples |
| 2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
| 2025-08-01
⋅
Belarus-Linked DSLRoot Proxy Network Deploys Hardware in U.S. Residences, Including Military Homes |
| 2025-08-01
⋅
Nextron Systems
⋅
Plague: A Newly Discovered PAM-Based Backdoor for Linux Plague |
| 2025-08-01
⋅
Reverse The Malware
⋅
SHA-256 C2 ( Command and Control Server ) Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Command and Control Server ( C2's ) Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Awesome C2 Panel Favicon Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Internet Search Engine Queries for Identifying C2 Panels |
| 2025-08-01
⋅
Reverse The Malware
⋅
Threat Hunting with 20 Urlscan.io Search Queries |
| 2025-08-01
⋅
Reverse The Malware
⋅
Feeds of Indicators Of Compromise ( TweetFeed ) |
| 2025-08-01
⋅
Medium RaghavtiResearch
⋅
https://medium.com/p/862eea4a2db4 |
| 2025-07-31
⋅
Intrinsec
⋅
Shadow syndicate infrastructure illumination AMOS BlackCat Cactus Cicada3301 Clop LockBit PLAY RansomHub Royal Ransom Silence |
| 2025-07-31
⋅
Twitter (@JAMESWT_WT)
⋅
Tweet about BQTlock BQTlock |
| 2025-07-31
⋅
Microsoft
⋅
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats ApolloShadow |
| 2025-07-31
⋅
Reverse The Malware
⋅
SysTracer: Another Suite for Digital Forensics and Incident Response |
| 2025-07-31
⋅
Reverse The Malware
⋅
WhatChanged ? : A Digital Forensics and Incident Response Suite |