Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-10-13Booz Allen HamiltonBooz Allen Hamilton
Same Cloak, More Dagger: Decoding how the People's Republic of China uses Cyberattacks
2022-05-06Palo Alto Networks Unit 42Chris Navarrete, Durgesh Sangvikar, Siddhart Shibiraj, Yanhui Jia, Yu Fu
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding
Cobalt Strike
2022-05-06Palo Alto Networks Unit 42Chris Navarrete, Durgesh Sangvikar, Siddhart Shibiraj, Yanhui Jia, Yu Fu
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding
Cobalt Strike
2022-05-06Palo Alto Networks Unit 42Chris Navarrete, Durgesh Sangvikar, Siddhart Shibiraj, Yanhui Jia, Yu Fu
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding
Cobalt Strike
2022-05-06Palo Alto Networks Unit 42Chris Navarrete, Durgesh Sangvikar, Siddhart Shibiraj, Yanhui Jia, Yu Fu
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding
Cobalt Strike
2022-05-06Palo Alto Networks Unit 42Chris Navarrete, Durgesh Sangvikar, Siddhart Shibiraj, Yanhui Jia, Yu Fu
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding
Cobalt Strike
2022-03-15Security Soup BlogRyan Campbell
Decoding a DanaBot Downloader
DanaBot
2021-09-27Youtube (OALabs)Sergei Frankoff
Live Coding A Squirrelwaffle Malware Config Extractor
Squirrelwaffle
2021-09-07Medium walmartglobaltechJason Reaves
Decoding SmartAssembly strings, a Haron ransomware case study
Haron Ransomware
2021-07-08Avast DecodedThreat Intelligence Team
Decoding Cobalt Strike: Understanding Payloads
Cobalt Strike Empire Downloader
2021-04-18YouTube (dist67)Didier Stevens
Decoding Cobalt Strike Traffic
Cobalt Strike
2021-02-02Trend MicroAbraham Camba, Byron Gelera, Catherine Loveria
Finding and Decoding Multi-Step Obfuscated Malware
2021-02-02Trend MicroAbraham Camba, Byron Gelera, Catherine Loveria
Finding and Decoding Multi-Step Obfuscated Malware
2021-02-02Trend MicroAbraham Camba, Byron Gelera, Catherine Loveria
Finding and Decoding Multi-Step Obfuscated Malware
2021-01-06SecureCodingSecureCoding
All About Doki Malware
Doki
2020-07-26Shells.System blogAskar
In-Memory shellcode decoding to evade AVs/EDRs
Cobalt Strike
2018-04-20NCC GroupNikolaos Pantazopoulos
Decoding network data from a Gh0st RAT variant
Ghost RAT APT27
2018-04-17NCC GroupNikolaos Pantazopoulos
Decoding network data from a Gh0st RAT variant
Ghost RAT APT27
2018-02-26Secure coding and more blogAntonio Parata
Analyzing the nasty .NET protection of the Ploutus.D malware
Ploutus ATM
2017-04-17Github (countercept)Luke Jennings
Python script for decoding DOUBLEPULSAR
2016-12-03Coding and SecurityCoding, Security
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis
DistTrack
2016-12-03Coding and SecurityCoding, Security
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis
DistTrack
2016-08-30Palo Alto Networks Unit 42Jeff White
Pythons and Unicorns and Hancitor…Oh My! Decoding Binaries Through Emulation
2015-08-10Coding StuffsSergio Paganoni
Fobber Code Decryption
Fobber
2014-08-01Coding and SecurityCoding, Security
Soraya Malware Analysis - Dropper
soraya
2014-08-01Coding and SecurityCoding, Security
Soraya Malware Analysis - Dropper
soraya