Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-02Trend MicroAbraham Camba, Byron Gelera, Catherine Loveria
Finding and Decoding Multi-Step Obfuscated Malware
2021-01-06SecureCodingSecureCoding
All About Doki Malware
Doki
2020-07-26Shells.System blogAskar
In-Memory shellcode decoding to evade AVs/EDRs
Cobalt Strike
2018-04-20NCC GroupNikolaos Pantazopoulos
Decoding network data from a Gh0st RAT variant
Ghost RAT APT27
2018-04-17NCC GroupNikolaos Pantazopoulos
Decoding network data from a Gh0st RAT variant
Ghost RAT APT27
2018-02-26Secure coding and more blogAntonio Parata
Analyzing the nasty .NET protection of the Ploutus.D malware
Ploutus ATM
2017-04-17Github (countercept)Luke Jennings
Python script for decoding DOUBLEPULSAR
2016-12-03Coding and SecurityCoding, Security
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis
DistTrack
2016-08-30Palo Alto Networks Unit 42Jeff White
Pythons and Unicorns and Hancitor…Oh My! Decoding Binaries Through Emulation
2015-08-10Coding StuffsSergio Paganoni
Fobber Code Decryption
Fobber
2014-08-01Coding and SecurityCoding, Security
Soraya Malware Analysis - Dropper
soraya