Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-01-08YouTube (Embee Research)Embee_research
Malware Analysis - Powershell decoding and .NET C2 Extraction (Quasar RAT)
Quasar RAT
2024-01-08YouTube (Embee Research)Embee_research
Malware Analysis - Simple Javascript Decoding and C2 Extraction (Redline Stealer)
RedLine Stealer
2024-01-08YouTube (Embee Research)Embee_research
Javascript Malware Analysis - Decoding an AgentTesla Loader
Agent Tesla
2024-01-08YouTube (Embee Research)Embee_research
Malware Analysis - Decoding Obfuscated Powershell and HTA Files (Lumma Stealer)
Lumma Stealer
2023-12-12Youtube (OALabs)Sergei Frankoff
Tips For Analyzing Delphi Binaries in IDA (Danabot)
DanaBot
2023-12-05YouTube (SecureWorks)Austin Graham
Emulating Qakbot with Austin Graham
QakBot
2023-11-16YouTube (Swiss Cyber Storm)Angelo Violetti
Resilience Rising: Countering the Threat Actors Behind Black Basta Ransomware
Black Basta
2023-11-07Youtube (Virus Bulletin)Daniel Lunghi
Possible supply chain attack targeting South Asian government delivers Shadowpad
ShadowPad
2023-09-18SentinelOneAlex Delamotte
CapraTube | Transparent Tribe’s CapraRAT Mimics YouTube to Hijack Android Phones
CapraRAT Operation C-Major
2023-08-19Youtube (MalwareAnalysisForHedgehogs)Karsten Hahn
Malware Analysis - Agniane Stealer, Native Stub to .NET Unpacking
Cinoshi
2023-07-28YouTube (SANS Cyber Defense)Stef Rand
Drop It Like It's Qbot: Separating malicious droppers, loaders, and crypters from their payloads
CloudEyE QakBot
2023-05-25YouTube (BSidesCharm)Asheer Malhotra
it’s all Magic(RAT) – A look into recent North Korean nation-state attacks
MagicRAT VSingle YamaBot
2023-05-19YouTube (NorthSec)Ivan Kwiatkowski
Go reverse-engineering workshop
GoldMax
2023-05-12YouTube (BSides Prishtina)Egxona Ferati, META
Automating Threat Detection and Response at Scale - Egxona Ferati
2023-05-09YouTube (Security BSides London)Google, Troy Defty
Detection At Scale
2023-05-03AhnLabASEC
RecordBreaker Stealer Distributed via Hacked YouTube Accounts
RecordBreaker
2023-05-03Youtube (Guided Hacking)Guided Hacking
PolyGlot Malware Analysis​ - IcedID Stager
PhotoLoader
2023-04-26Youtube (MalwareAnalysisForHedgehogs)Karsten Hahn
Malware Theory - Packer identifiers don"t tell you if a file is packed
2023-04-16YouTube (botconf eu)Crowdstrike Technical Analysis Cell (TAC), Suweera De Souza
Tracking Bumblebee’s Development
BumbleBee
2023-04-13YouTube (The Korea Society)Jean Lee, Mandiant, Michael Barnhart
The North Korean Cyber Threat