Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-12ConfiantTaha
How SeaFlower 藏海花 installs backdoors in iOS/Android web3 wallets to steal your seed phrase
2021-10-18Medium ConfiantTaha Karim
Profiling hackers using the Malvertising Attack Matrix by Confiant
2021-06-10ZAYOTEMBilal BAKARTEPE, Harun YAKUT, Sinan BAYKAN, Taha HİCRET
LokiBot Technical Analysis Report
LokiBot
2021-04-24Medium lordx64Taha Karim
Initial analysis of PasswordState supply chain attack backdoor code
2021-03-13YouTube (0xc7a)0xca7, Twitter (@CatWithoutAHat7)
DearCry Ransomware - A quick look 0x01
dearcry
2021-03-13YouTube (0xc7a)Twitter (@CatWithoutAHat7)
DearCry Ransomware - A quick look 0x02
dearcry
2021-03-13YouTube (0xc7a)Twitter (@CatWithoutAHat7)
DearCry Ransomware - A quick look 0x00
dearcry
2020-12-14Twitter (@lordx64)Taha Karim
Tweet on a one liner to decrypt SUNBURST backdoor
SUNBURST
2020-07-14ConfiantTaha Karim
Internet Explorer CVE-2019–1367 Exploitation — part 3
2020-07-13ConfiantTaha Karim
Internet Explorer CVE-2019–1367 Exploitation — part 1
2020-07-13ConfiantTaha Karim
Internet Explorer CVE-2019–1367 In the wild Exploitation - prelude
2019-12-10ConfiantTaha Karim
New macOS Bundlore Loader Analysis
Bundlore
2019-04-08SANS Cyber Security SummitTaha Karim
Trails of WindShift
WindTail ZhMimikatz
2018-01-01DarkMatterTaha K.
IN THE TRAILS OF WINDSHIFTAPT
WindTail WindShift
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2015-12-11FireEyeDaniel Regalado, Taha Karim
LATENTBOT: Trace Me If You Can
LatentBot