Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Shellcode ( HTA as Dropper ) Part 1
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious LNK Part 2
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell Part 2
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Javascript
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Batch Script
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious HTA
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious LNK File
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious VBS Script
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell Script
2025-07-020x0d4y0x0d4y
VELETRIX Loader Dissection: Kill Chain Analysis of China-Nexus Telecommunications Infrastructure Targeting
VELETRIX
2025-07-01ANY.RUNMauro Eldritch
DEVMAN Ransomware: Analysis of New DragonForce Variant
DEVMAN
2025-06-29Medium Sapir TwigSapir Twig
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat
DarkGate
2025-06-24CertegoFederico Fantini
Malware Analysis - Inside Lumma Stealer
Lumma Stealer
2025-06-20Github (VenzoV)VenzoV
Analysis of Amatera Stealer v1 (Test build)
Amatera
2025-06-16Glueck KanjaPascal Asch
Inside Akira Stealer: A full technical analysis of a modular stealer
Akira Stealer
2025-06-09GeniansGenians
Analysis of the Triple Combo Threat of the Kimsuky Group
FlowerPower Appleseed BabyShark
2025-06-05Mobile-Hackermh
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
SpyMax
2025-06-03K7 SecurityPraveen Babu
In-depth Analysis of a 2025 ViperSoftX Variant
ViperSoftX
2025-06-03ANY.RUNANY.RUN
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals
BeaverTail OtterCookie InvisibleFerret
2025-05-28Medium (@mvaks)mvaks
Bombardino Crocodilo in Poland — analysis of IKO Lokaty mobile malware campaign
Crocodilus