Date Author Title
2024-04-17Rob VandenBrinkThe CVE's They are A-Changing!
2024-02-15Jesse La Grew[Guest Diary] Learning by doing: Iterative adventures in troubleshooting
2023-06-22Brad DuncanQakbot (Qbot) activity, obama271 distribution tag
2023-04-05Jesse La GrewExploration of DShield Cowrie Data with jq
2023-03-29Didier StevensExtracting Multiple Streams From OLE Files
2023-03-28Jesse La GrewNetwork Data Collector Placement Makes a Difference
2023-01-21Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-08Guy BruneauDShield Sensor JSON Log Analysis
2022-12-28Rob VandenBrinkPlaying with Powershell and JSON (and Amazon and Firewalls)
2022-08-08Johannes UllrichJSON All the Logs!
2022-04-03Didier Stevensjo
2022-04-02Didier Stevenscurl 7.82.0 Adds --json Option
2021-12-10Xavier MertensPython Shellcode Injection From JSON Data
2021-10-21Brad Duncan"Stolen Images Evidence" campaign pushes Sliver-based malware
2021-08-29Guy BruneauFilter JSON Data by Value with Linux jq
2021-08-13Brad DuncanExample of Danabot distributed through malspam
2020-11-22Didier StevensQuick Tip: Extracting all VBA Code from a Maldoc - JSON Format
2020-01-02Xavier MertensRansomware in Node.js
2019-08-30Xavier MertensMalware Dropping a Local Node.js Instance
2019-08-28Xavier MertensMalware Samples Compiling Their Next Stage on Premise
2018-07-15Didier StevensVideo: Retrieving and processing JSON data (BTC example)
2018-07-14Didier StevensRetrieving and processing JSON data (BTC example)
2017-11-13Guy Bruneaujsonrpc Scanning for root account
2016-12-13Xavier MertensUAC Bypass in JScript Dropper
2016-08-28Guy BruneauSpam with Obfuscated Javascript
2015-11-09John BambenekProtecting Users and Enterprises from the Mobile Malware Threat
2012-06-25Guy BruneauUsing JSDetox to Analyze and Deobfuscate Javascript
2009-05-18Rick WannerJSRedir-R/Gumblar badness
2009-02-25Andre LudwigAdobe Acrobat pdf 0-day exploit, No JavaScript needed!