Common Information
Type | Value |
---|---|
Value |
showthread.php |
Category | |
Type | File |
Misp Type | |
Description |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | 2022-03-30 | 17 | Social Engineering Remains Key Tradecraft for Iranian APTs | |||
Details | Website | 2021-04-22 | 8 | Binary Data Hiding in VB6 Executables - Avast Threat Labs | ||
Details | 2019-08-14 | 367 | Silence 2.0: Going Global | |||
Details | 2019-08-14 | 362 | Silence 2.0 Going Global | |||
Details | 2019-08-09 | 248 | MACHETE JUST GOT SHARPER | |||
Details | 2018-10-02 | 52 | Process Control through Counterfeit Comms: Using and abusing built-in functionality to own a PLC | |||
Details | Website | 2018-07-18 | 15 | Dissecting Smoke Loader | ||
Details | 2018-01-16 | 50 | The life story of an IPT – Inept Persistent Threat actor | |||
Details | 2017-10-09 | 46 | Digital Souks: A Glimpse into Middle Eastern and North African Underground | |||
Details | 2017-07-26 | 203 | Сборник исследований по практической безопасности | |||
Details | Website | 2017-03-02 | 149 | Bye Empire, Hello Nebula Exploit Kit. | ||
Details | Website | 2016-05-29 | 229 | Keep Calm and (Don’t) Enable Macros: A New Threat Actor Targets UAE Dissidents - The Citizen Lab | ||
Details | Website | 2016-03-11 | 22 | Gaudox - HTTP Bot (1.1.0.1) | C++/ASM | Ring3 Rootkit | Watchdog | Antis | | ||
Details | Website | 2016-03-10 | 31 | SensePost | Android hooking with introspy | ||
Details | 2015-09-29 | 97 | Proactive Threat Identification Neutralizes Remote Access Trojan Efficacy | |||
Details | Website | 2015-03-24 | 8 | DIY dual boot Nexus tablet; make your own mobile test rig with NetHunter | Pen Test Partners | ||
Details | Website | 2014-11-08 | 13 | Review of jSpy a RAT from jSpy.net - How-To-Hack.net | ||
Details | 2013-11-05 | 88 | November2013.indd | |||
Details | Website | 2013-10-30 | 25 | #badBIOS - Security Art Work | ||
Details | Website | 2013-10-13 | 11 | Apktool 2.0.0 Beta 7 Released | ||
Details | 2013-10-04 | 119 | Deepweb and Cybercrime | |||
Details | 2013-07-19 | 247 | End-to-End Analysis of a Domain Generating Algorithm Malware Family | |||
Details | Website | 2013-04-24 | 3 | Microsoft Surface RT, a quick insight | ||
Details | Website | 2012-08-03 | 65 | Cridex Analysis using Volatility - by Andre' DiMino - samples and memory analysis resources | ||
Details | Website | 2012-05-03 | 171 | Operation Cleanup Japan (OCJP) by 0Day.jp May 3 |