Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-02-180x00secjeff
@online{jeff:20220218:dynamically:5629608, author = {jeff}, title = {{Dynamically extracting the encryption key from a simple ransomware}}, date = {2022-02-18}, organization = {0x00sec}, url = {https://0x00sec.org/t/dynamically-extracting-the-encryption-key-from-a-simple-ransomware/28379}, language = {English}, urldate = {2022-03-28} } Dynamically extracting the encryption key from a simple ransomware
2020-04-270x00secDan Lisichkin
@online{lisichkin:20200427:master:1cfb192, author = {Dan Lisichkin}, title = {{Master of RATs - How to create your own Tracker}}, date = {2020-04-27}, organization = {0x00sec}, url = {https://0x00sec.org/t/master-of-rats-how-to-create-your-own-tracker/20848}, language = {English}, urldate = {2020-04-28} } Master of RATs - How to create your own Tracker
Quasar RAT
2020-02-040x00secDan Lisichkin
@online{lisichkin:20200204:analyzing:bba72ea, author = {Dan Lisichkin}, title = {{Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6}}, date = {2020-02-04}, organization = {0x00sec}, url = {https://0x00sec.org/t/analyzing-modern-malware-techniques-part-3/18943}, language = {English}, urldate = {2020-02-08} } Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6
2020-01-190x00secDan Lisichkin
@online{lisichkin:20200119:analyzing:1f21f30, author = {Dan Lisichkin}, title = {{Analyzing Modern Malware Techniques - Part 1}}, date = {2020-01-19}, organization = {0x00sec}, url = {https://0x00sec.org/t/analyzing-modern-malware-techniques-part-1/18663}, language = {English}, urldate = {2020-01-27} } Analyzing Modern Malware Techniques - Part 1
Kovter