Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-07-07Github (cocomelonc)cocomelonc
Malware development trick - part 34: Find PID via WTSEnumerateProcesses. Simple C++ example.
2023-07-06Github (Helixo32)Helixo32
NimBlackout
NimBlackout
2023-06-30Github (itaymigdal)Itay Migdal
Formbook unpacking
Formbook
2023-06-26Github (cocomelonc)cocomelonc
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
2023-06-19Github (cocomelonc)cocomelonc
Malware AV/VM evasion - part 17: bypass UAC via fodhelper.exe. Simple C++ example.
Glupteba
2023-06-17Github (EmissarySpider)EmissarySpider
ransomware-descendants
Babuk Conti LockBit
2023-06-15Github (cocomelonc)cocomelonc
Malware analysis report: Babuk ransomware
Babuk
2023-06-14VulnCheckJacob Baines
Fake Security Researcher GitHub Repositories Deliver Malicious Implant
TorLoader
2023-06-04Github (cocomelonc)cocomelonc
Malware development trick - part 31: Run shellcode via SetTimer. Simple C++ example.
2023-05-21Github (0xThiebaut)Maxime Thiebaut
PCAPeek
IcedID QakBot
2023-05-19Trend MicroJaromír Hořejší, Nitesh Surana
Rust-Based Info Stealers Abuse GitHub Codespaces
DeltaStealer
2023-05-10Github (MythicAgents)Cody Thomas
Github Repository for Nimplant
Nimplant
2023-05-10Github (MythicAgents)Cody Thomas
Github Repository for Poseidon
Poseidon Poseidon
2023-04-20Github (dodo-sec)dodo-sec
An analysis of syscall usage in Cobalt Strike Beacons
Cobalt Strike
2023-04-01Github (dodo-sec)dodo-sec
SmoothOperator
3CX Backdoor
2023-03-23AhnLabVanish
Kimsuky group distributes malware disguised as a profile file (GitHub)
2023-03-21Github (rivitna)Andrey Zhdanov
BlackCat v3 Decryptor Scripts
BlackCat BlackCat
2023-03-09Github (cocomelonc)cocomelonc
Malware AV/VM evasion - part 13: encrypt/decrypt payload via Madryga. Simple C++ example.
2023-02-14Github (clairelevin)Claire Levin
Writing a decryptor for Jaff ransomware
Jaff
2023-02-09Github (muha2xmad)Muhammad Hasan Ali
Technical analysis of Godfather android malware
Godfather