Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-18LogpointAnish Bogati
Exploring Strela Stealer: Initial Payload Analysis and Insights
StrelaStealer
2024-11-07LogpointAnish Bogati
Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
Loki Password Stealer (PWS)
2024-03-04LogpointAnish Bogati
Inside DarkGate: Exploring the infection chain and capabilities
DarkGate
2023-08-23LogpointAnish Bogati, Nischal khadgi
Defending Against 8base: Uncovering Their Arsenal and Crafting Responses
8Base Phobos SmokeLoader SystemBC
2023-03-23LogpointAnish Bogati
Emerging Threats: AgentTesla – A Review and Detection Strategies
Agent Tesla
2023-01-05LogpointAnish Bogati
A crowning achievement: Exploring the exploit of Royal ransomware
Royal Ransom
2022-10-18LogpointAnish Bogati, Nilaa Maharjan
Hunting Lockbit Variation
LockBit