Click here to download all references as Bib-File.•
2017-10-05
⋅
Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell KopiLuwak |
2017-02-24
⋅
Some stuff about security.. Blog
⋅
Hunting Retefe with Splunk - some interesting points Retefe |
2015-11-03
⋅
Reversing the SMS C&C protocol of Emmental (1st part - understanding the code) Retefe |
2015-10-28
⋅
Reversing the C2C HTTP Emmental communication Retefe |