Click here to download all references as Bib-File.•
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Shellcode ( HTA as Dropper ) Part 1 |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious LNK Part 2 |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Powershell Part 2 |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Javascript |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Batch Script |
2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious HTA |
2025-07-14
⋅
Reverse The Malware
⋅
Analysis Malicious LNK File |
2025-07-14
⋅
Reverse The Malware
⋅
Analysis Malicious VBS Script |
2025-07-14
⋅
Reverse The Malware
⋅
Analysis Malicious Powershell Script |
2025-07-02
⋅
0x0d4y
⋅
VELETRIX Loader Dissection: Kill Chain Analysis of China-Nexus Telecommunications Infrastructure Targeting VELETRIX |
2025-07-01
⋅
ANY.RUN
⋅
DEVMAN Ransomware: Analysis of New DragonForce Variant DEVMAN |
2025-06-29
⋅
Medium Sapir Twig
⋅
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat DarkGate |
2025-06-24
⋅
Certego
⋅
Malware Analysis - Inside Lumma Stealer Lumma Stealer |
2025-06-20
⋅
Github (VenzoV)
⋅
Analysis of Amatera Stealer v1 (Test build) Amatera |
2025-06-16
⋅
Glueck Kanja
⋅
Inside Akira Stealer: A full technical analysis of a modular stealer Akira Stealer |
2025-06-09
⋅
Genians
⋅
Analysis of the Triple Combo Threat of the Kimsuky Group FlowerPower Appleseed BabyShark |
2025-06-05
⋅
Mobile-Hacker
⋅
Analysis of Spyware That Helped to Compromise a Syrian Army from Within SpyMax |
2025-06-03
⋅
K7 Security
⋅
In-depth Analysis of a 2025 ViperSoftX Variant ViperSoftX |
2025-06-03
⋅
ANY.RUN
⋅
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals BeaverTail OtterCookie InvisibleFerret |
2025-05-28
⋅
Medium (@mvaks)
⋅
Bombardino Crocodilo in Poland — analysis of IKO Lokaty mobile malware campaign Crocodilus |