Click here to download all references as Bib-File.•
2021-04-17
⋅
YouTube (Worcester DEFCON Group)
⋅
Inside IcedID: Anatomy Of An Infostealer IcedID |
2021-02-03
⋅
TA551/Shathak Threat Research IcedID |
2020-06-17
⋅
Nettitude Labs
⋅
Detecting PoshC2 – Indicators of Compromise PoshC2 |
2020-01-01
⋅
Github (nettitude)
⋅
Repository for Python Server for PoshC2 PoshC2 |
2014-04-17
⋅
Nettitude Labs
⋅
A quick analysis of the latest Shadow Brokers dump DarkPulsar |