Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-11-20Outpost24Alberto Marín
Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection
Lumma Stealer
2023-10-03Outpost24David Catalan
Rhadamanthys malware analysis: How infostealers use VMs to avoid analysis
2023-06-13Outpost24Beatriz Pimenta Klein
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
2023-04-05Outpost24Alberto Marín
Everything you need to know about the LummaC2 Stealer: Leveraging IDA Python and Unicorn to deobfuscate Windows API Hashing
Lumma Stealer