Common Information
Type Value
Value
8af2cf1a254b1dafe9e15027687b0315493877524c089403d3ffffa950389a30
Category
Type Sha256
Misp Type
Description
Details Published Attributes CTI Title
Details Website 2020-10-02 39 Graphology of an Exploit - Hunting for exploits by looking for the author's fingerprints - Check Point Research