2024-10-03 |
StealC Malware Analysis Part 3 |
Malware ‧ Lexfo |
|
2024-10-03 |
StealC Malware Analysis Part 2 |
Malware ‧ Lexfo |
|
2024-10-03 |
StealC Malware Analysis Part 1 |
Malware ‧ Lexfo |
|
2024-09-26 |
Jupiter X Core Plugin <= 4.6.5 Remote Code Execution (CVE-2024-7772) |
Exploit ‧ Geo |
|
2024-09-26 |
Jupiter X Core Plugin <= 4.7.5 Authentication Bypass (CVE-2024-7781) |
Exploit ‧ Geo |
|
2024-07-25 |
Writing a stealer logs parser |
CTI ‧ Mathilde Boivin |
|
2023-06-14 |
CVE-2023-27997 - Forensics short notice for XORtigate |
CSIRT ‧ Maxime Chouquet |
|
2023-06-13 |
XORtigate: Pre-authentication Remote Code Execution on Fortigate VPN (CVE-2023-27997) |
Exploit ‧ Charles Fol |
|
2023-04-03 |
Sshimpanzee |
Post Exploitation ‧ Titouan Lazard |
|
2023-03-20 |
Cobalt Strike Investigation - Part 2 |
CSIRT ‧ Lexfo |
|
2022-09-21 |
Cobalt Strike Investigation Part 1 |
CSIRT ‧ Lexfo |
|
2022-04-12 |
Obfuscated obfuscation |
Vulnerability ‧ Lexfo |
|
2022-03-07 |
AvosLocker Ransomware Linux Version Analysis |
Malware ‧ Lexfo |
|
2021-09-24 |
DanaBot Communications Update |
Malware ‧ Lexfo |
|
2021-04-07 |
Dridex Loader Analysis |
Malware ‧ Lexfo |
|
2021-03-25 |
Pentesting a banking FTP service |
Vulnerability ‧ Rémi ROCHER |
|
2021-03-25 |
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4) |
Vulnerability ‧ Nicolas FABRETTI |
|
2021-03-25 |
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 2/4) |
Vulnerability ‧ Nicolas FABRETTI |
|
2021-03-25 |
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 3/4) |
Vulnerability ‧ Nicolas FABRETTI |
|
2021-03-25 |
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 1/4) |
Vulnerability ‧ Nicolas FABRETTI |
|
2021-03-25 |
Lockbit analysis |
Malware ‧ Lexfo |
|
2021-03-25 |
Whitepaper: The Lazarus Constellation - A study on North-Korean malware |
Malware ‧ Lexfo |
|