2025-03-10 | Xavier Mertens | Shellcode Encoded in UUIDs |
2024-12-31 | Xavier Mertens | No Holiday Season for Attackers |
2024-08-23 | Jesse La Grew | Pandas Errors: What encoding are my logs in? |
2024-08-19 | Xavier Mertens | Do you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python |
2023-12-06 | Guy Bruneau | Revealing the Hidden Risks of QR Codes [Guest Diary] |
2023-07-28 | Xavier Mertens | ShellCode Hidden with Steganography |
2023-03-16 | Xavier Mertens | Simple Shellcode Dissection |
2023-03-07 | Johannes Ullrich | Hackers Love This VSCode Extension: What You Can Do to Stay Safe |
2022-11-04 | Xavier Mertens | Remcos Downloader with Unicode Obfuscation |
2022-09-14 | Xavier Mertens | Easy Process Injection within Python |
2022-05-30 | Xavier Mertens | New Microsoft Office Attack Vector via "ms-msdt" Protocol Scheme (CVE-2022-30190) |
2022-02-26 | Guy Bruneau | Using Snort IDS Rules with NetWitness PacketDecoder |
2022-01-22 | Xavier Mertens | Mixed VBA & Excel4 Macro In a Targeted Excel Sheet |
2022-01-20 | Xavier Mertens | RedLine Stealer Delivered Through FTP |
2022-01-06 | Xavier Mertens | Malicious Python Script Targeting Chinese People |
2022-01-05 | Xavier Mertens | Code Reuse In the Malware Landscape |
2021-12-10 | Xavier Mertens | Python Shellcode Injection From JSON Data |
2021-10-20 | Xavier Mertens | Thanks to COVID-19, New Types of Documents are Lost in The Wild |
2021-08-20 | Xavier Mertens | Waiting for the C2 to Show Up |
2021-02-13 | Guy Bruneau | vSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html |
2021-01-18 | Didier Stevens | Doc & RTF Malicious Document |
2020-10-14 | Xavier Mertens | Nicely Obfuscated Python RAT |
2020-09-02 | Xavier Mertens | Python and Risky Windows API Calls |
2020-08-06 | Xavier Mertens | A Fork of the FTCode Powershell Ransomware |
2020-07-27 | Didier Stevens | Analyzing Metasploit ASP .NET Payloads |
2019-12-12 | Xavier Mertens | Code & Data Reuse in the Malware Ecosystem |
2019-10-27 | Didier Stevens | Using scdbg to Find Shellcode |
2019-07-08 | Didier Stevens | Machine Code? No! |
2019-07-04 | Didier Stevens | Machine Code? |
2019-05-31 | Didier Stevens | Retrieving Second Stage Payload with Ncat |
2019-05-30 | Didier Stevens | Analyzing First Stage Shellcode |
2019-05-06 | Didier Stevens | Text and Text |
2019-05-01 | Xavier Mertens | Another Day, Another Suspicious UDF File |
2019-04-23 | Didier Stevens | Malicious VBA Office Document Without Source Code |
2019-03-24 | Didier Stevens | Decoding QR Codes with Python |
2019-02-25 | Didier Stevens | Sextortion Email Variant: With QR Code |
2019-01-02 | Didier Stevens | Maldoc with Nonfunctional Shellcode |
2018-09-24 | Didier Stevens | Analyzing Encoded Shellcode with scdbg |
2018-09-08 | Didier Stevens | Video: Using scdbg to analyze shellcode |
2018-09-03 | Didier Stevens | Another quickie: Using scdbg to analyze shellcode |
2018-08-31 | Jim Clausing | Quickie: Using radare2 to disassemble shellcode |
2018-06-04 | Rob VandenBrink | Digging into Authenticode Certificates |
2017-04-16 | Johannes Ullrich | Tool to Detect Active Phishing Attacks Using Unicode Look-Alike Domains |
2016-11-24 | Didier Stevens | Extracting Shellcode From JavaScript |
2016-11-18 | Didier Stevens | VBA Shellcode and Windows 10 |
2016-09-26 | Didier Stevens | VBA and P-code |
2015-09-21 | Xavier Mertens | Detecting XCodeGhost Activity |
2015-03-30 | Didier Stevens | YARA Rules For Shellcode |
2013-10-25 | Johannes Ullrich | PHP.net compromise aftermath: Why Code Signing Beats Hashes |
2013-08-04 | Johannes Ullrich | BBCode tag "[php]" used to inject php code |
2013-02-16 | Lorna Hutcheson | Fedora RedHat Vulnerabilty Released |
2012-07-19 | Mark Baggett | A Heap of Overflows? |
2012-04-26 | Richard Porter | Packetstorm Security and Metasploit have Exploit code for MS12-027 |
2012-04-25 | Daniel Wesemann | Blacole's shell code |
2012-03-16 | Russ McRee | MS12-020 RDP vulnerabilities: Patch, Mitigate, Detect |
2012-03-11 | Johannes Ullrich | An Analysis of Jester's QR Code Attack. (Guest Diary) |
2011-08-11 | Guy Bruneau | BlackBerry Enterprise Server Critical Update |
2011-08-03 | Johannes Ullrich | Malicious Images: What's a QR Code |
2011-03-07 | Bojan Zdrnja | Oracle padding attacks (Codegate crypto 400 writeup) |
2010-05-12 | Rob VandenBrink | Adobe Shockwave Update |
2010-03-10 | Rob VandenBrink | Microsoft Security Advisory 981374 - Remote Code Execution Vulnerability for IE6 and IE7 |
2010-02-08 | Adrien de Beaupre | When is a 0day not a 0day? Fake OpenSSh exploit, again. |
2009-08-08 | Guy Bruneau | XML Libraries Data Parsing Vulnerabilities |
2009-05-29 | Lorna Hutcheson | VMWare Patches Released |
2008-07-22 | Mari Nichols | ‘Cold Boot’ Attack Utility Tools |
2008-06-10 | Swa Frantzen | Ransomware keybreaking |