Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-01-31MalwarebytesMalwarebytes Labs
Locky Bart ransomware and backend server analysis
Locky
2017-01-27Joe's SecurityJoe
Deep Analysis of Android Ransom Charger
Charger
2017-01-26FortinetKai Lu
Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part I: Debugging in The Scope of Native Layer
Rootnik
2017-01-26FortinetKai Lu
Deep Analysis of Android Rootnik Malware Using Advanced Anti-Debug and Anti-Hook, Part II: Analysis of The Scope of Java
Rootnik
2017-01-17Malware Traffic AnalysisBrad Duncan
EITEST RIG-V FROM 92.53.127.86 SENDS SPORA RANSOMWARE
Spora
2017-01-13Artem Baranov
Finfisher rootkit analysis
FinFisher RAT
2017-01-04CERT.PLJarosław Jedynak
Technical analysis of CryptoMix/CryptFile2 ransomware
CryptoMix
2016-12-27Hazmalware
ANALYSIS OF AUGUST STEALER MALWARE
August Stealer
2016-12-06FortinetXiaopeng Zhang
Deep Analysis of the Online Banking Botnet TrickBot
TrickBot
2016-12-03Coding and SecurityCoding, Security
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis
DistTrack
2016-11-23G DataG Data
Analysis: Ursnif - spying on your data since 2007
Gozi
2016-11-21NowSecureSergi Àlvarez i Capilla
Android malware analysis with Radare: Dissecting the Triada Trojan
Triada
2016-11-08SentinelOneArnaud Abbati
Analysis of IOS.GUIINJECT Adware Library
GuiInject
2016-10-27SekoiaPaul Rascagnères
Rootkit analysisUse case on HideDRV
HideDRV
2016-10-27Simon Roses Femerling BlogSimon Roses
Mirai DDoS Botnet: Source Code & Binary Analysis
Mirai
2016-10-24Lastlinelastline Labs Team
Evasive Malware Detects and Defeats Virtual Machine Analysis
2016-10-16RapidityNetworksIoannis Profetis, Sam Edwards
Hajime: Analysis of a decentralizedinternet worm for IoT devices
Hajime
2016-10-11Artem Baranov
Remsec driver analysis - Part 3
Remsec
2016-10-10Artem Baranov
Remsec driver analysis - Part 2
Remsec
2016-10-03Artem Baranov
Remsec driver analysis
Remsec