Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-28Reverse The MalwareDiyar Saadi
Bypass MainWindowTitle Techniques
2025-07-27Reverse The MalwareDiyar Saadi
Process Exits Instead Of Malware Self-Destructing.
2025-07-26Reverse The MalwareDiyar Saadi
User History Artifact : Practical Gathering of Artifacts
2025-07-26Reverse The MalwareDiyar Saadi
Forensic Artifacts for User Windows History Activity
2025-07-16Reverse The MalwareDiyar Saadi
Analysis Fake reCAPTCHA ( Powershell Stage )
2025-07-16Reverse The MalwareDiyar Saadi
Analysis Malicious reCAPTCHA
2025-07-16Reverse The MalwareDiyar Saadi
Analysis CryptoMiner Sample ( Script Based )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious HTA Dropper .
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Second Stage of Double Encoded Malicious Powershell
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Double Encoded Malicious Powershell
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell ( Part 4 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious JAR ( Part 3 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious JAR ( Part 2 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious JAR ( Part 1 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Shellcode ( HTA as Dropper ) Part 2
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Shellcode ( HTA as Dropper ) Part 1
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious LNK Part 2
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell Part 2
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Javascript
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Batch Script
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious HTA
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious LNK File
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious VBS Script
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell Script
2024-10-04Memory ForensicDiyar Saadi
Inside Cridex - Memory Analysis Case Study
Feodo
2024-01-01Diyar Saadi
Analyzing Malware Embedded in Device Firmware