pe3zx
|
32cd6d7466
|
Add: Backoff: New Point of Sale Malware
|
2018-10-02 21:17:59 +07:00 |
|
pe3zx
|
3fc4fe8ed8
|
Add: RawPOS Technical Brief
|
2018-10-02 21:17:07 +07:00 |
|
pe3zx
|
118e1fe4d0
|
Add: New FrameworkPOS variant exfiltrates data via DNS requests
|
2018-10-02 21:15:59 +07:00 |
|
pe3zx
|
14033e1630
|
Add: Evolution and Characterization of Point-of-Sale RAM Scraping Malware
|
2018-10-02 21:15:15 +07:00 |
|
pe3zx
|
7f1bc5917b
|
Add: Buy Candy, Lose Your Credit Card - Investigation PoS RAM Scraping Malware
|
2018-10-02 21:13:46 +07:00 |
|
pe3zx
|
0bd717d9bb
|
Add: PoS RAM Scraper Malware - Past, Present, and Future
|
2018-10-02 21:12:26 +07:00 |
|
pe3zx
|
127e9fd2a9
|
Add: Attacks on point-of-sales systems
|
2018-10-02 21:11:00 +07:00 |
|
pe3zx
|
c9124fb51c
|
Add: Another Brick in the FrameworkPoS
|
2018-10-02 21:09:29 +07:00 |
|
pe3zx
|
c36aa9a292
|
Add: Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6
|
2018-10-02 21:07:38 +07:00 |
|
pe3zx
|
093b909075
|
Add Word Forensic Analysis And Compound File Binary Format
|
2018-09-23 18:59:20 +07:00 |
|
pe3zx
|
3a8b85c7d1
|
Add alexandreborges/malwoverview
|
2018-09-23 18:46:15 +07:00 |
|
pe3zx
|
369406c1d9
|
Add 10 recent OSX/iOS/Mac malware samples
|
2018-09-23 18:44:21 +07:00 |
|
pe3zx
|
c2b3514c21
|
Add Mac Malware
|
2018-09-23 18:43:04 +07:00 |
|
pe3zx
|
95762c8f92
|
ashishb/android-malware
|
2018-09-23 18:41:45 +07:00 |
|
pe3zx
|
462aeb8b9d
|
Add AndroMalShare
|
2018-09-23 18:40:40 +07:00 |
|
pe3zx
|
d6573128ad
|
Add scumware.org
|
2018-09-23 18:39:04 +07:00 |
|
pe3zx
|
970685defe
|
Add VX Vault
|
2018-09-23 18:37:36 +07:00 |
|
pe3zx
|
a96225b40b
|
Add Malc0de database
|
2018-09-23 18:36:33 +07:00 |
|
pe3zx
|
51bb91dda9
|
Add SARVAN
|
2018-09-23 18:35:03 +07:00 |
|
pe3zx
|
e9c436043a
|
Add malware.one
|
2018-09-23 18:32:28 +07:00 |
|
pe3zx
|
63755d2176
|
Add ViruSign
|
2018-09-23 18:31:18 +07:00 |
|
pe3zx
|
c2ffe5a591
|
Add VirusBay
|
2018-09-23 18:30:06 +07:00 |
|
pe3zx
|
cda141fad0
|
Add MalShare
|
2018-09-23 18:28:24 +07:00 |
|
pe3zx
|
dae21ab5cb
|
Add AVCaesar
|
2018-09-23 18:25:59 +07:00 |
|
pe3zx
|
2da8cad42e
|
Add Hybrid-Analysis
|
2018-09-23 18:24:28 +07:00 |
|
pe3zx
|
b4a5d14d78
|
Add contagio malware dump
|
2018-09-23 18:22:15 +07:00 |
|
pe3zx
|
cebe48618f
|
trisf/theZoo
|
2018-09-23 18:04:37 +07:00 |
|
pe3zx
|
d8a99dd72c
|
Add ThunderCls/xAnalyzer
|
2018-09-23 17:58:52 +07:00 |
|
pe3zx
|
e02d5d9dcc
|
Add Cn33liz/p0wnedShell
|
2018-09-23 17:55:39 +07:00 |
|
pe3zx
|
4222889cee
|
Add CVE-2018-3620 and CVE-2018-3646
|
2018-09-23 17:53:15 +07:00 |
|
pe3zx
|
6626016ed6
|
Add byt3bl33d3r/SprayingToolkit
|
2018-09-23 17:37:09 +07:00 |
|
pe3zx
|
813448d1f8
|
Add Exploitus
|
2018-09-23 17:34:51 +07:00 |
|
pe3zx
|
567edc808f
|
Add Phishing Frenzy
|
2018-09-23 17:30:19 +07:00 |
|
pe3zx
|
392b5e7669
|
Add droidefense/engine
|
2018-09-23 17:27:12 +07:00 |
|
pe3zx
|
4e5fe97abf
|
Add Compiler Explorer
|
2018-09-23 17:23:52 +07:00 |
|
pe3zx
|
da1b3d3db6
|
Add JPCERTCC/SysmonSearch
|
2018-09-23 13:21:13 +07:00 |
|
pe3zx
|
cf9c44448d
|
Add APT Groups and Operations
|
2018-09-23 13:18:51 +07:00 |
|
pe3zx
|
1cd72adee9
|
Add Uncoder.io
|
2018-09-23 13:11:07 +07:00 |
|
pe3zx
|
c9b075baaf
|
Add VSCMount
|
2018-09-23 13:09:07 +07:00 |
|
pe3zx
|
ed57a0a663
|
Add Google Dataset Search
|
2018-09-23 13:03:38 +07:00 |
|
pe3zx
|
7a766b4318
|
Add Neo23x0/exotron
|
2018-09-23 13:00:39 +07:00 |
|
pe3zx
|
df9831b119
|
Add mxmssh/drltrace
|
2018-09-23 12:57:12 +07:00 |
|
pe3zx
|
6ad9d83126
|
Add Heapple Pie - The macOS/iOS default heap
|
2018-09-22 17:55:26 +07:00 |
|
pe3zx
|
513e1fbc29
|
Add Apple File System Reference
|
2018-09-22 17:29:00 +07:00 |
|
pe3zx
|
3c5c85342f
|
[Add] DCShadow - Minimal permissions, Active Directory Deception, Shadowception and more
|
2018-08-26 22:53:13 +07:00 |
|
pe3zx
|
37ebbb52f5
|
[Add] ACTIVE DIRECTORY ATTACK - DCSHADOW
|
2018-08-26 22:48:51 +07:00 |
|
pe3zx
|
c9bb813f1d
|
[Add] Hot Potato – Windows Privilege Escalation
|
2018-08-26 22:35:24 +07:00 |
|
pe3zx
|
011847e2ad
|
[Add] DCShadow: Attacking Active Directory with Rogue DCs
|
2018-08-26 22:33:36 +07:00 |
|
pe3zx
|
6b69ed2ef2
|
[Add] Vba2Graph - Generate call graphs from VBA code, for easier analysis of malicious documents.
|
2018-08-26 22:00:52 +07:00 |
|
pe3zx
|
39022312ae
|
[Add] felixweyne/imaginaryC2: Imaginary C2 is a python tool which aims to help in the behavioral (network) analysis of malware.
|
2018-08-26 21:59:33 +07:00 |
|