Click here to download all references as Bib-File.
2022-02-18 ⋅ 0x00sec ⋅ Dynamically extracting the encryption key from a simple ransomware |
2020-04-27 ⋅ 0x00sec ⋅ Master of RATs - How to create your own Tracker Quasar RAT |
2020-02-04 ⋅ 0x00sec ⋅ Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6 |
2020-01-19 ⋅ 0x00sec ⋅ Analyzing Modern Malware Techniques - Part 1 Kovter |