Click here to download all references as Bib-File.•
| 2025-07-28
            
            ⋅
            
            Reverse The Malware
            ⋅ Bypass MainWindowTitle Techniques | 
| 2025-07-27
            
            ⋅
            
            Reverse The Malware
            ⋅ Process Exits Instead Of Malware Self-Destructing. | 
| 2025-07-26
            
            ⋅
            
            Reverse The Malware
            ⋅ User History Artifact : Practical Gathering of Artifacts | 
| 2025-07-26
            
            ⋅
            
            Reverse The Malware
            ⋅ Forensic Artifacts for User Windows History Activity | 
| 2025-07-16
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Fake reCAPTCHA ( Powershell Stage ) | 
| 2025-07-16
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious reCAPTCHA | 
| 2025-07-16
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis CryptoMiner Sample ( Script Based ) | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious HTA Dropper . | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Second Stage of Double Encoded Malicious Powershell | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Double Encoded Malicious Powershell | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious Powershell ( Part 4 ) | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious JAR ( Part 3 ) | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious JAR ( Part 2 ) | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious JAR ( Part 1 ) | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious Shellcode ( HTA as Dropper ) Part 2 | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious Shellcode ( HTA as Dropper ) Part 1 | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious LNK Part 2 | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious Powershell Part 2 | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious Javascript | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious Batch Script | 
| 2025-07-15
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious HTA | 
| 2025-07-14
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious LNK File | 
| 2025-07-14
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious VBS Script | 
| 2025-07-14
            
            ⋅
            
            Reverse The Malware
            ⋅ Analysis Malicious Powershell Script |