Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-30CYBER GEEKS All Things InfosecCyberMasterV
ChromeLoader Browser Hijacker
Choziosi
2022-08-29CYBER GEEKS All Things InfosecCyberMasterV
A Technical Analysis of Pegasus for Android – Part 1
Chrysaor
2022-07-26CYBER GEEKS All Things InfosecCyberMasterV
HOW to Analyze Linux Malware - A Case Study of Symbiote
Symbiote
2022-06-30CYBER GEEKS All Things InfosecCyberMasterV
How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-04-27CYBER GEEKS All Things InfosecCyberMasterV
Reverse Engineering PsExec for fun and knowledge
2021-11-30CYBER GEEKS All Things InfosecCyberMasterV
Just another analysis of the njRAT malware – A step-by-step approach
NjRAT
2021-10-31CYBER GEEKS All Things InfosecCyberMasterV
A detailed analysis of the STOP/Djvu Ransomware
STOP
2021-09-29CYBER GEEKS All Things InfosecCyberMasterV
How to defeat the Russian Dukes: A step-by-step analysis of MiniDuke used by APT29/Cozy Bear
MiniDuke
2021-06-14CYBER GEEKS All Things InfosecCyberMasterV
A Step-by-Step Analysis of a New Version of DarkSide Ransomware
DarkSide
2021-01-25CYBER GEEKS All Things InfosecCyberMasterV
A detailed analysis of ELMER Backdoor used by APT16
ELMER
2020-12-26CYBER GEEKS All Things InfosecCyberMasterV
Analyzing APT19 malware using a step-by-step method
Derusbi
2020-11-27CYBER GEEKS All Things InfosecCyberMasterV
Dissecting APT21 samples using a step-by-step approach
NetTraveler