Click here to download all references as Bib-File.•
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of DLL Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
Reverse Engineering of PDF Document Honeyfiles |
2025-08-03
⋅
Reverse The Malware
⋅
One Click and You're Caught: HoneyFiles in Action |
2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Fast Flux Techniques |
2025-08-03
⋅
Reverse The Malware
⋅
Identifying a Domain Generation Algorithm |
2025-08-03
⋅
Reverse The Malware
⋅
Gathering Indicators of Compromise Through Malware Datasets. |
2025-08-02
⋅
cocomelonc
⋅
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples |
2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
2025-08-01
⋅
Belarus-Linked DSLRoot Proxy Network Deploys Hardware in U.S. Residences, Including Military Homes |
2025-08-01
⋅
Nextron Systems
⋅
Plague: A Newly Discovered PAM-Based Backdoor for Linux Plague |
2025-08-01
⋅
Reverse The Malware
⋅
SHA-256 C2 ( Command and Control Server ) Hashes |
2025-08-01
⋅
Reverse The Malware
⋅
Command and Control Server ( C2's ) Hashes |
2025-08-01
⋅
Reverse The Malware
⋅
Awesome C2 Panel Favicon Hashes |
2025-08-01
⋅
Reverse The Malware
⋅
Internet Search Engine Queries for Identifying C2 Panels |
2025-08-01
⋅
Reverse The Malware
⋅
Threat Hunting with 20 Urlscan.io Search Queries |
2025-08-01
⋅
Reverse The Malware
⋅
Feeds of Indicators Of Compromise ( TweetFeed ) |
2025-08-01
⋅
Medium RaghavtiResearch
⋅
https://medium.com/p/862eea4a2db4 |
2025-07-31
⋅
Twitter (@JAMESWT_WT)
⋅
Tweet about BQTlock BQTlock |
2025-07-31
⋅
Microsoft
⋅
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats ApolloShadow |
2025-07-31
⋅
Reverse The Malware
⋅
SysTracer: Another Suite for Digital Forensics and Incident Response |