Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-01-13Artem Baranov
Finfisher rootkit analysis
FinFisher RAT
2017-01-04CERT.PLJarosław Jedynak
Technical analysis of CryptoMix/CryptFile2 ransomware
CryptoMix
2016-12-27Hazmalware
ANALYSIS OF AUGUST STEALER MALWARE
August Stealer
2016-12-06FortinetXiaopeng Zhang
Deep Analysis of the Online Banking Botnet TrickBot
TrickBot
2016-12-03Coding and SecurityCoding, Security
"Sophisticated" and "Genius" Shamoon 2.0 Malware Analysis
DistTrack
2016-11-23G DataG Data
Analysis: Ursnif - spying on your data since 2007
Gozi
2016-11-21NowSecureSergi Àlvarez i Capilla
Android malware analysis with Radare: Dissecting the Triada Trojan
Triada
2016-11-08SentinelOneArnaud Abbati
Analysis of IOS.GUIINJECT Adware Library
GuiInject
2016-10-27SekoiaPaul Rascagnères
Rootkit analysisUse case on HideDRV
HideDRV
2016-10-27Simon Roses Femerling BlogSimon Roses
Mirai DDoS Botnet: Source Code & Binary Analysis
Mirai
2016-10-24Lastlinelastline Labs Team
Evasive Malware Detects and Defeats Virtual Machine Analysis
2016-10-16RapidityNetworksIoannis Profetis, Sam Edwards
Hajime: Analysis of a decentralizedinternet worm for IoT devices
Hajime
2016-10-11Artem Baranov
Remsec driver analysis - Part 3
Remsec
2016-10-10Artem Baranov
Remsec driver analysis - Part 2
Remsec
2016-10-03Artem Baranov
Remsec driver analysis
Remsec
2016-09-13CiscoJosh Reynolds
H1N1: Technical analysis reveals new capabilities
H1N1 Loader
2016-08-08ForcepointNicholas Griffin
MONSOON - Analysis Of An APT Campaign
BadNews TinyTyphon QUILTED TIGER
2016-08-08ForcepointAbel Toro, Andy Settle, Nicholas Griffin
MONSOON – ANALYSIS OF AN APT CAMPAIGN
BadNews TinyTyphon QUILTED TIGER
2016-08-01UperesiaFelix Weyne
Analysis of a packed Pony downloader
Pony
2016-08-01MalwarebytesMalwarebytes Labs
Shakti Trojan: Technical Analysis
Shakti