Click here to download all references as Bib-File.•
2022-02-18
⋅
0x00sec
⋅
Dynamically extracting the encryption key from a simple ransomware |
2020-04-27
⋅
0x00sec
⋅
Master of RATs - How to create your own Tracker Quasar RAT |
2020-02-04
⋅
0x00sec
⋅
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6 |
2020-01-19
⋅
0x00sec
⋅
Analyzing Modern Malware Techniques - Part 1 Kovter |