Click here to download all references as Bib-File.
|2017-10-05 ⋅ |
Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell
|2015-11-03 ⋅ |
Reversing the SMS C&C protocol of Emmental (1st part - understanding the code)
|2015-10-28 ⋅ |
Reversing the C2C HTTP Emmental communication