Click here to download all references as Bib-File.•
2022-04-27
⋅
Medium elis531989
⋅
The chronicles of Bumblebee: The Hook, the Bee, and the Trickbot connection BumbleBee TrickBot |
2022-04-25
⋅
Medium proferosec-osm
⋅
Static unpacker and decoder for Hello Kitty Packer HelloKitty |
2022-04-15
⋅
Medium walmartglobaltech
⋅
Revisiting BatLoader C2 structure BATLOADER |
2022-04-14
⋅
Medium (@DCSO_CyTec)
⋅
404 — File still found SideWinder |
2022-04-07
⋅
Medium osamaellahi
⋅
Bypass Multi Factor Authentication (MFA) of OUTLOOK Evilginx |
2022-04-06
⋅
Medium mars0x
⋅
WannaHusky Malware Analysis w/ YARA + TTPs WannaHusky |
2022-04-05
⋅
Medium jsecurity101
⋅
Bypassing Access Mask Auditing Strategies |
2022-04-04
⋅
Medium (csg-govtech)
⋅
Uncommon office malware stagers |
2022-04-01
⋅
Medium s2wlab
⋅
Rising Stealer in Q1 2022: BlackGuard Stealer BlackGuard |
2022-03-31
⋅
Medium michaelkoczwara
⋅
LAPSUS$ TTP’s |
2022-03-28
⋅
Medium walmartglobaltech
⋅
CobaltStrike UUID stager Cobalt Strike |
2022-03-27
⋅
Medium M3H51N
⋅
Malware Analysis — NanoCore Rat Nanocore RAT |
2022-03-24
⋅
⋅
Medium s2wlab
⋅
Footsteps of the LAPSUS$ hacking group |
2022-03-10
⋅
Medium walmartglobaltech
⋅
Diavol the Enigma of Ransomware Diavol |
2022-03-09
⋅
Medium Invictus Incident Response
⋅
Set up Splunk for Incident Response in GCP in 15 minutes.. |
2022-03-08
⋅
Medium (Cryptax)
⋅
Live reverse engineering of a trojanized medical app — Android/Joker Joker |
2022-03-04
⋅
Medium walmartglobaltech
⋅
SystemBC, PowerShell version SystemBC |
2022-03-03
⋅
Medium Wes Lambert
⋅
Zero Dollar Detection and Response Orchestration with n8n, Security Onion, TheHive, and Velociraptor |
2022-03-03
⋅
Medium s2wlab
⋅
Deep Analysis of Redline Stealer: Leaked Credential with WCF RedLine Stealer |
2022-03-01
⋅
Medium whickey000
⋅
How I Cracked CONTI Ransomware Group’s Leaked Source Code ZIP File Conti |