Date Author Title

DRIVE BY DOWNLOADS

2014-02-05Johannes UllrichTo Merrillville or Sochi: How Dangerous is it to travel?

DRIVE

2021-09-15/a>Brad DuncanHancitor campaign abusing Microsoft's OneDrive
2018-06-16/a>Russ McReeAnomaly Detection & Threat Hunting with Anomalize
2016-07-03/a>Guy BruneauIs Data Privacy part of your Company's Culture?
2014-02-05/a>Johannes UllrichTo Merrillville or Sochi: How Dangerous is it to travel?
2013-08-14/a>Johannes UllrichImaging LUKS Encrypted Drives
2010-03-24/a>Johannes Ullrich".sys" Directories Delivering Driveby Downloads
2010-01-06/a>Guy BruneauSecure USB Flaw Exposed

BY

2024-02-12/a>Johannes UllrichExploit against Unnamed "Bytevalue" router vulnerability included in Mirai Bot
2023-08-17/a>Jesse La GrewCommand Line Parsing - Are These Really Unique Strings?
2022-09-22/a>Xavier MertensRAT Delivered Through FODHelper
2022-06-28/a>Johannes UllrichPossible Scans for HiByMusic Devices
2022-06-04/a>Guy BruneauSpam Email Contains a Very Large ISO file
2022-05-20/a>Xavier MertensA 'Zip Bomb' to Bypass Security Controls & Sandboxes
2021-06-15/a>Johannes UllrichMulti Perimeter Device Exploit Mirai Version Hunting For Sonicwall, DLink, Cisco and more
2020-12-29/a>Jan KoprivaWant to know what's in a folder you don't have a permission to access? Try asking your AV solution...
2020-11-25/a>Xavier MertensLive Patching Windows API Calls Using PowerShell
2020-10-14/a>Xavier MertensNicely Obfuscated Python RAT
2020-04-04/a>Didier StevensNew Bypass Technique or Corrupt Word Document?
2019-12-26/a>Xavier MertensBypassing UAC to Install a Cryptominer
2019-12-14/a>Didier Stevens(Lazy) Sunday Maldoc Analysis: A Bit More ...
2019-11-08/a>Xavier MertensMicrosoft Apps Diverted from Their Main Use
2019-07-25/a>Rob VandenBrinkWhen Users Attack! Users (and Admins) Thwarting Security Controls
2017-03-05/a>Didier StevensAnother example of maldoc string obfuscation, with extra bonus: UAC bypass
2016-12-13/a>Xavier MertensUAC Bypass in JScript Dropper
2016-11-16/a>Xavier MertensExample of Getting Analysts & Researchers Away
2015-06-16/a>John BambenekCVE-2014-4114 and an Interesting AV Bypass Technique
2015-01-27/a>Johannes UllrichNew Critical GLibc Vulnerability CVE-2015-0235 (aka GHOST)
2014-07-28/a>Guy BruneauManagement and Control of Mobile Device Security
2014-03-13/a>Daniel WesemannIdentification and authentication are hard ... finding out intention is even harder
2014-02-05/a>Johannes UllrichTo Merrillville or Sochi: How Dangerous is it to travel?
2013-09-18/a>Rob VandenBrinkCisco DCNM Update Released
2013-06-27/a>Tony CarothersRuby Update for SSL Vulnerability
2013-01-09/a>Rob VandenBrinkSQL Injection Flaw in Ruby on Rails
2012-05-08/a>Bojan ZdrnjaWindows Firewall Bypass Vulnerability and NetBIOS NS
2010-03-24/a>Johannes Ullrich".sys" Directories Delivering Driveby Downloads
2008-04-22/a>donald smithSymantec decomposer rar bypass allowed malicious content.

DOWNLOADS

2014-02-05/a>Johannes UllrichTo Merrillville or Sochi: How Dangerous is it to travel?