Date Author Title
2022-09-22Xavier MertensRAT Delivered Through FODHelper
2022-06-04Guy BruneauSpam Email Contains a Very Large ISO file
2022-05-20Xavier MertensA 'Zip Bomb' to Bypass Security Controls & Sandboxes
2020-12-29Jan KoprivaWant to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-11-25Xavier MertensLive Patching Windows API Calls Using PowerShell
2020-04-04Didier StevensNew Bypass Technique or Corrupt Word Document?
2019-12-26Xavier MertensBypassing UAC to Install a Cryptominer
2019-11-08Xavier MertensMicrosoft Apps Diverted from Their Main Use
2019-07-25Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2017-03-05Didier StevensAnother example of maldoc string obfuscation, with extra bonus: UAC bypass
2016-12-13Xavier MertensUAC Bypass in JScript Dropper
2016-11-16Xavier MertensExample of Getting Analysts & Researchers Away
2015-06-16John BambenekCVE-2014-4114 and an Interesting AV Bypass Technique
2014-03-13Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder
2013-09-18Rob VandenBrinkCisco DCNM Update Released
2012-05-08Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2008-04-22donald smithSymantec decomposer rar bypass allowed malicious content.