Click here to download all references as Bib-File.•
2025-08-08
⋅
Reverse The Malware
⋅
Detecting and Identifying Hidden Processes (Rekall Edition) |
2025-08-08
⋅
Reverse The Malware
⋅
Detecting and Identifying Hidden Processes (MemProcFs Edition) |
2025-08-08
⋅
Reverse The Malware
⋅
Reverse Engineering ANY.RUN Sandbox |
2025-08-07
⋅
abuse.ch
⋅
MalwareBazaar | SHA256 c1d781f4c9469977a32f2ad6edea4fda98e6a8eda5aa10149be2311cb369c48a (XTinyLoader) XTinyLoader |
2025-08-06
⋅
Kaspersky
⋅
Spyware that pretends to be an antivirus LunaSpy |
2025-08-06
⋅
ANY.RUN
⋅
PyLangGhost RAT: Rising Stealer from Lazarus Group Striking Finance and Technology PylangGhost GolangGhost |
2025-08-06
⋅
Reverse The Malware
⋅
Reverse Engineering My Name is Yuyun Worm |
2025-08-06
⋅
Silent Push
⋅
Unmasking SocGholish: Silent Push Untangles the Malware Web Behind the “Pioneer of Fake Updates” and Its Operator, TA569 FAKEUPDATES MintsLoader Parrot TDS Parrot TDS WebShell Raspberry Robin |
2025-08-05
⋅
Defentive
⋅
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT Ghost RAT |
2025-08-05
⋅
The DFIR Report
⋅
From Bing Search to Ransomware: Bumblebee and AdaptixC2 Deliver Akira AdaptixC2 Akira BumbleBee |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of Word Document Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of DLL Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of PDF Document Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
One Click and You're Caught: HoneyFiles in Action |
2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Fast Flux Techniques |
2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Domain Generation Algorithm |
2025-08-03
⋅
Reverse The Malware
⋅
Gathering Indicators of Compromise Through Malware Datasets. |
2025-08-02
⋅
cocomelonc
⋅
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples |
2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
2025-08-01
⋅
Belarus-Linked DSLRoot Proxy Network Deploys Hardware in U.S. Residences, Including Military Homes |