Common Information
Type | Value |
---|---|
Value |
www.hex-rays.com |
Category | |
Type | Domain |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-03-06 | 2 | Reverse engineering my first CrackMe | ||
Details | Website | 2022-09-21 | 23 | Native function and Assembly Code Invocation - Check Point Research | ||
Details | 2022-09-19 | 101 | Tracking the entire iceberg – long‑term APT malware C2 protocol emulation and scanning | |||
Details | Website | 2021-04-01 | 20 | Technical Analysis of DearCry Ransomware - Checkmate | ||
Details | 2019-11-08 | 43 | Play fuzzing machine – hunting iOS/macOS kernel vulnerabilities automatically and smartly | |||
Details | 2019-10-29 | 127 | A close look at Fallout Exploit Kit and Raccoon Stealer | |||
Details | Website | 2017-07-01 | 67 | Todd's GIANT Intro of Windows Malware Analysis Tools - Todd Cullum Research | ||
Details | Website | 2017-01-03 | 36 | SensePost | Exploiting ms16-098 rgnobj integer overflow on windows 8.1 x64 bit by abusing gdi objects | ||
Details | 2016-12-24 | 74 | CROSS-PLATFORM MOBILE MALWARE: WRITE ONCE, RUN EVERYWHERE | |||
Details | Website | 2015-06-15 | 65 | Stegoloader: A Stealthy Information Stealer | ||
Details | Website | 2014-08-20 | 4 | Discovering Dynamically Loaded API in Visual Basic Binaries | ||
Details | 2013-07-19 | 247 | End-to-End Analysis of a Domain Generating Algorithm Malware Family | |||
Details | 2013-04-04 | 190 | April-2013.indd | |||
Details | Website | 2012-11-29 | 13 | Using Precalculated String Hashes when Reverse Engineering Shellcode | Mandiant | ||
Details | 2008-06-05 | 39 | Killing the myth of Cisco IOS rootkits: DIK (Da Ios rootKit | |||
Details | — | 102 | WHITE PAPER A Detailed Analysis of an Advanced Persistent Threat Malware |