Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-02-12HelpNetSecurityZeljka Zorz
Decryptor for Rhysida ransomware is available!
Rhysida
2024-02-02Github (VenzoV)VenzoV
WikiLoader "notepad" part 1 - Decrypting Shellcode
WikiLoader
2024-01-09Avast DecodedThreat Research Team
Avast Updates Babuk Ransomware Decryptor in Cooperation with Cisco Talos and Dutch Police
Babuk
2023-11-23cocomelonccocomelonc
Malware and cryptography 22: encrypt/decrypt payload via XTEA. Simple C++ example.
2023-10-20cocomelonccocomelonc
Malware and cryptography 21: encrypt/decrypt payload via WAKE. Simple C++ example.
2023-10-18Twitter (@embee_research)Embee_research
Ghidra Tutorial - Using Entropy To Locate a Cobalt Strike Decryption Function
Cobalt Strike
2023-08-28Github (cocomelonc)cocomelonc
Malware and cryptography 20: encrypt/decrypt payload via Skipjack. Simple C++ example.
2023-08-15Github (muha2xmad)Muhammad Hasan Ali
StealC string decryption
Stealc
2023-08-13Github (cocomelonc)cocomelonc
Malware and cryptography 1: encrypt/decrypt payload via RC5. Simple C++ example.
2023-08-10Github (muha2xmad)Muhammad Hasan Ali
Amadey string decryptor
Amadey
2023-08-03OALabsSergei Frankoff
Golang Garble String Decryption
Bandit Stealer
2023-06-29Avast DecodedThreat Research Team
Decrypted: Akira Ransomware
Akira
2023-06-26Github (cocomelonc)cocomelonc
Malware AV/VM evasion - part 18: encrypt/decrypt payload via modular multiplication-based block cipher. Simple C++ example.
2023-06-23Medium (Cryptax)Axelle Apvrille
Inside KangaPack: the Kangaroo packer with native decryption
FluHorse
2023-05-22kienmanowar Blogm4n0w4r
[Case study] Decrypt strings using Dumpulator
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer
2023-04-24Immersive LabsKevin Breen
Detecting and decrypting Sliver C2 – a threat hunter’s guide
Sliver
2023-04-18ANY.RUNANY.RUN
PrivateLoader: Analyzing the Encryption and Decryption of a Modern Loader
PrivateLoader