Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-04-14Medium (@DCSO_CyTec)Axel Wauer, DCSO CyTec
404 — File still found
SideWinder
2022-04-14Medium (@DCSO_CyTec)Axel Wauer, DCSO CyTec
404 — File still found
SideWinder
2022-04-07Medium osamaellahiOsama Ellahi
Bypass Multi Factor Authentication (MFA) of OUTLOOK
Evilginx
2022-04-06Medium mars0xMars
WannaHusky Malware Analysis w/ YARA + TTPs
WannaHusky
2022-04-05Medium jsecurity101Jonathan Johnson
Bypassing Access Mask Auditing Strategies
2022-04-04Medium (csg-govtech)Max Chee
Uncommon office malware stagers
2022-04-01Medium s2wlabJiho Kim
Rising Stealer in Q1 2022: BlackGuard Stealer
BlackGuard
2022-03-31Medium michaelkoczwaraMichael Koczwara
LAPSUS$ TTP’s
2022-03-28Medium walmartglobaltechJason Reaves
CobaltStrike UUID stager
Cobalt Strike
2022-03-27Medium M3H51NM3H51N
Malware Analysis — NanoCore Rat
Nanocore RAT
2022-03-24Medium s2wlabS2W TALON
Footsteps of the LAPSUS$ hacking group
2022-03-10Medium walmartglobaltechJason Reaves, Joshua Platt
Diavol the Enigma of Ransomware
Diavol
2022-03-10Medium walmartglobaltechJason Reaves, Joshua Platt
Diavol the Enigma of Ransomware
Diavol
2022-03-09Medium Invictus Incident ResponseInvictus Incident Response
Set up Splunk for Incident Response in GCP in 15 minutes..
2022-03-08Medium (Cryptax)Axelle Apvrille
Live reverse engineering of a trojanized medical app — Android/Joker
Joker
2022-03-04Medium walmartglobaltechJason Reaves, Joshua Platt
SystemBC, PowerShell version
SystemBC
2022-03-04Medium walmartglobaltechJason Reaves, Joshua Platt
SystemBC, PowerShell version
SystemBC
2022-03-03Medium Wes LambertWes Lambert
Zero Dollar Detection and Response Orchestration with n8n, Security Onion, TheHive, and Velociraptor
2022-03-03Medium s2wlabJiho Kim
Deep Analysis of Redline Stealer: Leaked Credential with WCF
RedLine Stealer
2022-03-01Medium whickey000Wade Hickey
How I Cracked CONTI Ransomware Group’s Leaked Source Code ZIP File
Conti