Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-10-18Medium ConfiantTaha Karim
Profiling hackers using the Malvertising Attack Matrix by Confiant
2021-04-24Medium lordx64Taha Karim
Initial analysis of PasswordState supply chain attack backdoor code
2020-12-14Twitter (@lordx64)Taha Karim
Tweet on a one liner to decrypt SUNBURST backdoor
SUNBURST
2020-07-14ConfiantTaha Karim
Internet Explorer CVE-2019–1367 Exploitation — part 3
2020-07-13ConfiantTaha Karim
Internet Explorer CVE-2019–1367 Exploitation — part 1
2020-07-13ConfiantTaha Karim
Internet Explorer CVE-2019–1367 In the wild Exploitation - prelude
2019-12-10ConfiantTaha Karim
New macOS Bundlore Loader Analysis
Bundlore
2019-04-08SANS Cyber Security SummitTaha Karim
Trails of WindShift
WindTail ZhMimikatz
2016-04-13FireEyeDaniel Regalado, Erye Hernandez, Taha Karim, Varun Jian
Ghosts in the Endpoint
PLEAD
2015-12-11FireEyeDaniel Regalado, Taha Karim
LATENTBOT: Trace Me If You Can
LatentBot