Click here to download all references as Bib-File.•
2021-02-02
⋅
Trend Micro
⋅
Finding and Decoding Multi-Step Obfuscated Malware |
2021-01-06
⋅
SecureCoding
⋅
All About Doki Malware Doki |
2020-07-26
⋅
Shells.System blog
⋅
In-Memory shellcode decoding to evade AVs/EDRs Cobalt Strike |
2018-04-20
⋅
NCC Group
⋅
Decoding network data from a Gh0st RAT variant Ghost RAT APT27 |
2018-04-17
⋅
NCC Group
⋅
Decoding network data from a Gh0st RAT variant Ghost RAT APT27 |
2018-02-26
⋅
Secure coding and more blog
⋅
Analyzing the nasty .NET protection of the Ploutus.D malware Ploutus ATM |
2017-04-17
⋅
Github (countercept)
⋅
Python script for decoding DOUBLEPULSAR |
2016-12-03
⋅
Coding and Security
⋅
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis DistTrack |
2016-08-30
⋅
Palo Alto Networks Unit 42
⋅
Pythons and Unicorns and Hancitor…Oh My! Decoding Binaries Through Emulation |
2015-08-10
⋅
Coding Stuffs
⋅
Fobber Code Decryption Fobber |
2014-08-01
⋅
Coding and Security
⋅
Soraya Malware Analysis - Dropper soraya |