Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-08-19AonDaniel Stein, Joshua Pivirotto, Stroz Friedberg, Zachary Reichert
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules
sedexp
2023-08-03AonAon’s Cyber Labs
DarkGate Keylogger Analysis: Masterofnone
DarkGate
2023-02-10AonCarly Battaile
Bypassing MFA: A Forensic Look At Evilginx2 Phishing Kit
2023-02-03AonZachary Reichert
AgentVX And Taurus
Taurus Stealer
2022-12-16AonJohn Ailes, Julia Paluch
SCL -1: The Dangerous Side Of Safe Senders
2022-10-06AonAndre Maccarone, Chapin Bryce, John Ailes
Amazon Web Services: Exploring The Cost Of Exfil
2022-02-26AonEduardo Mattos, Rob Homewood
Yours Truly, Signed AV Driver: Weaponizing An Antivirus Driver
Cuba KillAV
2022-02-26AonEduardo Mattos, Rob Homewood
Yours Truly, Signed AV Driver: Weaponizing An Antivirus Driver
KillAV
2021-08-27AonAon’s Cyber Labs, Noah Rubin
Cobalt Strike Configuration Extractor and Parser
Cobalt Strike
2021-01-29AonAlex Parsons, Carly Battaile, Partha Alwar
Cloudy with a Chance of Persistent Email Access
SUNBURST
2017-05-03IEEEAlok Tongaonkar, Gaspar Modelo-Howard, Lorenzo De Carli, Ruben Torres, Somesh Jha
Botnet Protocol Inference in the Presence of Encrypted Traffic
Ramnit Sality ZeroAccess