Click here to download all references as Bib-File.•
| 2025-08-03
⋅
Reverse The Malware
⋅
Gathering Indicators of Compromise Through Malware Datasets. |
| 2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
| 2025-08-01
⋅
Reverse The Malware
⋅
SHA-256 C2 ( Command and Control Server ) Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Command and Control Server ( C2's ) Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Awesome C2 Panel Favicon Hashes |
| 2025-08-01
⋅
Reverse The Malware
⋅
Internet Search Engine Queries for Identifying C2 Panels |
| 2025-08-01
⋅
Reverse The Malware
⋅
Threat Hunting with 20 Urlscan.io Search Queries |
| 2025-08-01
⋅
Reverse The Malware
⋅
Feeds of Indicators Of Compromise ( TweetFeed ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
SysTracer: Another Suite for Digital Forensics and Incident Response |
| 2025-07-31
⋅
Reverse The Malware
⋅
WhatChanged ? : A Digital Forensics and Incident Response Suite |
| 2025-07-31
⋅
Reverse The Malware
⋅
MultiMon: Advanced System Monitoring DFIR Suite |
| 2025-07-31
⋅
Reverse The Malware
⋅
Directory Monitor : DFIR Directory Monitoring Toolki |
| 2025-07-31
⋅
Reverse The Malware
⋅
Moo0 File Monitor : DFIR File Monitoring Toolkit |
| 2025-07-31
⋅
Reverse The Malware
⋅
Free Folder Monitor : DFIR Folders Monitoring Toolkit |
| 2025-07-31
⋅
Reverse The Malware
⋅
Directory Monitoring : DFIR Folders - Directory Monitoring |
| 2025-07-31
⋅
Reverse The Malware
⋅
ArtiFast Forensics Artifacts Investigation - ShellBags |
| 2025-07-31
⋅
Reverse The Malware
⋅
ArtiFast Forensics Investigation - USB Forensics |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence Through NRD's ( New Registered Domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence via TLD's ( Top Level Domain ) |
| 2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence via GTLD's ( Generic Top Level Domain ) |