|
You are here |
intezer.com | ||
| | | | |
wsummerhill.github.io
|
|
| | | | | Malware Development Introduction (aka Malware Dev 101), Part 1 | |
| | | | |
pentestlaboratories.com
|
|
| | | | | Microsoft .NET framework is being heavily utilized by threat actors and red teams for defense evasion and staying off the radar during operations. Every .NET binary contains application domains where assemblies are loaded in a safe manner. The AppDomainManager object can be used to create new ApplicationDomains inside a .NET process. From the perspective of... | |
| | | | |
eshard.com
|
|
| | | | | We follow Andrew, a Malware Analyst, before and after implementing Time Travel Analysis as his main tool for Reverse Engineering malware. | |
| | | | |
blog.adolus.com
|
|
| | | A summary of aDolus' response to the vulnerability in the #XZ Utils library and how we reassured our customers that they were at no risk from this threat. | ||