Click here to download all references as Bib-File.•
| 2022-02-18
            
            ⋅
            
            0x00sec
            ⋅ Dynamically extracting the encryption key from a simple ransomware | 
| 2020-04-27
            
            ⋅
            
            0x00sec
            ⋅ Master of RATs - How to create your own Tracker Quasar RAT | 
| 2020-02-04
            
            ⋅
            
            0x00sec
            ⋅ Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6 | 
| 2020-01-19
            
            ⋅
            
            0x00sec
            ⋅ Analyzing Modern Malware Techniques - Part 1 Kovter |