Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-08-31Cyber GeeksCyberMasterV
@online{cybermasterv:20230831:deep:94c25e1, author = {CyberMasterV}, title = {{A Deep Dive into Brute Ratel C4 Payloads}}, date = {2023-08-31}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads/}, language = {English}, urldate = {2023-09-04} } A Deep Dive into Brute Ratel C4 Payloads
Brute Ratel C4
2022-10-31Cyber GeeksVlad Pasca
@online{pasca:20221031:technical:d4f90e3, author = {Vlad Pasca}, title = {{A Technical Analysis of Pegasus for Android - Part 3}}, date = {2022-10-31}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-3/}, language = {English}, urldate = {2022-11-01} } A Technical Analysis of Pegasus for Android - Part 3
Chrysaor
2022-09-27Cyber GeeksVlad Pasca
@online{pasca:20220927:technical:3b1f571, author = {Vlad Pasca}, title = {{A technical analysis of Pegasus for Android – Part 2}}, date = {2022-09-27}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-2/}, language = {English}, urldate = {2022-09-29} } A technical analysis of Pegasus for Android – Part 2
Chrysaor
2022-09-22Cyber GeeksVlad Pasca
@online{pasca:20220922:technical:96bb05e, author = {Vlad Pasca}, title = {{A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder}}, date = {2022-09-22}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/a-technical-analysis-of-the-leaked-lockbit-3-0-builder/}, language = {English}, urldate = {2022-09-26} } A Technical Analysis Of The Leaked LOCKBIT 3.0 Builder
LockBit
2022-08-30CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20220830:chromeloader:b050f70, author = {CyberMasterV}, title = {{ChromeLoader Browser Hijacker}}, date = {2022-08-30}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/chromeloader-browser-hijacker}, language = {English}, urldate = {2022-08-31} } ChromeLoader Browser Hijacker
Choziosi
2022-08-29CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20220829:technical:c339986, author = {CyberMasterV}, title = {{A Technical Analysis of Pegasus for Android – Part 1}}, date = {2022-08-29}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/a-technical-analysis-of-pegasus-for-android-part-1}, language = {English}, urldate = {2022-08-31} } A Technical Analysis of Pegasus for Android – Part 1
Chrysaor
2022-07-26Cyber GeeksVlad Pasca
@online{pasca:20220726:how:f891a3c, author = {Vlad Pasca}, title = {{How To Analyze Linux Malware – A Case Study Of Symbiote}}, date = {2022-07-26}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/how-to-analyze-linux-malware-a-case-study-of-symbiote/}, language = {English}, urldate = {2022-07-28} } How To Analyze Linux Malware – A Case Study Of Symbiote
Symbiote
2022-07-26CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20220726:how:3f5d6fc, author = {CyberMasterV}, title = {{HOW to Analyze Linux Malware - A Case Study of Symbiote}}, date = {2022-07-26}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/how-to-analyze-linux-malware-a-case-study-of-symbiote}, language = {English}, urldate = {2022-08-31} } HOW to Analyze Linux Malware - A Case Study of Symbiote
Symbiote
2022-06-30Cyber Geeks (CyberMasterV)Vlad Pasca
@online{pasca:20220630:how:78e5c24, author = {Vlad Pasca}, title = {{How to Expose a Potential Cybercriminal due to Misconfigurations}}, date = {2022-06-30}, organization = {Cyber Geeks (CyberMasterV)}, url = {https://cybergeeks.tech/how-to-expose-a-potential-cybercriminal-due-to-misconfigurations/}, language = {English}, urldate = {2022-07-05} } How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-06-30CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20220630:how:035d973, author = {CyberMasterV}, title = {{How to Expose a Potential Cybercriminal due to Misconfigurations}}, date = {2022-06-30}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/how-to-expose-a-potential-cybercriminal-due-to-misconfigurations}, language = {English}, urldate = {2022-08-31} } How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-04-27CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20220427:reverse:09cb18a, author = {CyberMasterV}, title = {{Reverse Engineering PsExec for fun and knowledge}}, date = {2022-04-27}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/reverse-engineering-psexec-for-fun-and-knowledge/}, language = {English}, urldate = {2022-05-09} } Reverse Engineering PsExec for fun and knowledge
2022-03-28Cyber Geeks (CyberMasterV)Vlad Pasca
@online{pasca:20220328:stepbystep:7d92613, author = {Vlad Pasca}, title = {{A Step-by-Step Analysis of the Russian APT Turla Backdoor called TinyTurla}}, date = {2022-03-28}, organization = {Cyber Geeks (CyberMasterV)}, url = {https://cybergeeks.tech/a-step-by-step-analysis-of-the-russian-apt-turla-backdoor-called-tinyturla/}, language = {English}, urldate = {2022-03-29} } A Step-by-Step Analysis of the Russian APT Turla Backdoor called TinyTurla
TinyTurla
2022-02-28Cyber GeeksVlad Pasca
@online{pasca:20220228:how:0e715ab, author = {Vlad Pasca}, title = {{How to Analyze Malicious Documents – Case Study of an Attack Targeting Ukrainian Organization}}, date = {2022-02-28}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/how-to-analyze-malicious-documents-case-study-of-an-attack-targeting-ukraine-organizations/}, language = {English}, urldate = {2022-03-07} } How to Analyze Malicious Documents – Case Study of an Attack Targeting Ukrainian Organization
2022-01-31Cyber GeeksVlad Pasca
@online{pasca:20220131:detailed:262ea52, author = {Vlad Pasca}, title = {{A Detailed Analysis Of Lazarus APT Malware Disguised As Notepad++ Shell Extension}}, date = {2022-01-31}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/a-detailed-analysis-of-lazarus-malware-disguised-as-notepad-shell-extension/}, language = {English}, urldate = {2023-07-24} } A Detailed Analysis Of Lazarus APT Malware Disguised As Notepad++ Shell Extension
AnchorMTea
2021-11-30CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20211130:just:d5f53c9, author = {CyberMasterV}, title = {{Just another analysis of the njRAT malware – A step-by-step approach}}, date = {2021-11-30}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/just-another-analysis-of-the-njrat-malware-a-step-by-step-approach/}, language = {English}, urldate = {2021-12-06} } Just another analysis of the njRAT malware – A step-by-step approach
NjRAT
2021-10-31CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20211031:detailed:290dacf, author = {CyberMasterV}, title = {{A detailed analysis of the STOP/Djvu Ransomware}}, date = {2021-10-31}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/a-detailed-analysis-of-the-stop-djvu-ransomware/}, language = {English}, urldate = {2021-11-08} } A detailed analysis of the STOP/Djvu Ransomware
STOP
2021-09-29CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20210929:how:b7fbf82, author = {CyberMasterV}, title = {{How to defeat the Russian Dukes: A step-by-step analysis of MiniDuke used by APT29/Cozy Bear}}, date = {2021-09-29}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/how-to-defeat-the-russian-dukes-a-step-by-step-analysis-of-miniduke-used-by-apt29-cozy-bear/}, language = {English}, urldate = {2021-10-14} } How to defeat the Russian Dukes: A step-by-step analysis of MiniDuke used by APT29/Cozy Bear
MiniDuke
2021-08-03Cyber GeeksCyberMasterV
@online{cybermasterv:20210803:stepbystep:2c73656, author = {CyberMasterV}, title = {{A step-by-step analysis of the new malware used by APT28/Sofacy called SkinnyBoy}}, date = {2021-08-03}, organization = {Cyber Geeks}, url = {https://cybergeeks.tech/skinnyboy-apt28/}, language = {English}, urldate = {2021-08-06} } A step-by-step analysis of the new malware used by APT28/Sofacy called SkinnyBoy
SkinnyBoy
2021-06-14CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20210614:stepbystep:6b4b871, author = {CyberMasterV}, title = {{A Step-by-Step Analysis of a New Version of DarkSide Ransomware}}, date = {2021-06-14}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/a-step-by-step-analysis-of-a-new-version-of-darkside-ransomware/}, language = {English}, urldate = {2021-06-22} } A Step-by-Step Analysis of a New Version of DarkSide Ransomware
DarkSide
2021-01-25CYBER GEEKS All Things InfosecCyberMasterV
@online{cybermasterv:20210125:detailed:c27540a, author = {CyberMasterV}, title = {{A detailed analysis of ELMER Backdoor used by APT16}}, date = {2021-01-25}, organization = {CYBER GEEKS All Things Infosec}, url = {https://cybergeeks.tech/a-detailed-analysis-of-elmer-backdoor-used-by-apt16/}, language = {English}, urldate = {2021-01-27} } A detailed analysis of ELMER Backdoor used by APT16
ELMER