Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-02-180x00secjeff
Dynamically extracting the encryption key from a simple ransomware
2020-04-270x00secDan Lisichkin
Master of RATs - How to create your own Tracker
Quasar RAT
2020-02-040x00secDan Lisichkin
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6
2020-01-190x00secDan Lisichkin
Analyzing Modern Malware Techniques - Part 1
Kovter