Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-03Hunt.ioHunt.io
ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
TONESHELL
2024-09-01Hunt.ioHunt.io
Echoes of Stargazer Goblin: Analyzing Shared TTPs from an Open Directory
Sliver
2024-08-29Hunt.ioHunt.io
Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Latrodectus
2024-07-23Hunt.ioHunt.io
A Simple Approach to Discovering Oyster Backdoor Infrastructure
Broomstick
2024-06-25Hunt.ioHunt.io
Good Game, Gone Bad: Xeno RAT Spread Via .gg Domains and GitHub
XenoRAT
2024-06-20Hunt.ioMichael R
Caught in the Act: Uncovering SpyNote in Unexpected Places
SpyNote
2024-06-06Hunt.ioHunt.io
Tracking LightSpy: Certificates as Windows into Adversary Behavior
lightSpy
2024-05-30Hunt.ioHunt.io
SolarMarker: Hunt Insights and Findings
solarmarker
2024-04-09Hunt.ioHunt.io
BlueShell: Four Years On, Still A Formidable Threat
BlueShell
2024-02-09Hunt.ioMichael R
Tracking ShadowPad Infrastructure Via Non-Standard Certificates
ShadowPad
2024-02-01Hunt.ioHunt.io
The Accidental Malware Repository: Hunting & Collecting Malware Via Open Directories (Part 1)
XWorm