Threat Intelligence Guides
Practical Queries for Identifying Malware Infrastructure - Part 2
Threat Intelligence Queries with Censys.
Threat Intelligence Guides
Threat Intelligence Queries with Censys.
Malware Analysis Guides
Useful code snippets for developing dotnet configuration extractors.
Detection Engineering
Decoding malware loaders using Procmon and Cyberchef. Utilising Powershell to retrieve additional payloads and free online tooling to identify the malware family.
Threat Intelligence Guides
An informal page for storing Censys/Shodan queries
Threat Intelligence Guides
Identifying Amadey Bot Servers Using Shodan.
Threat Intelligence Guides
Identification of Laplas infrastructure with Shodan and Censys.
Threat Intelligence Guides
Extraction of Quasar C2 configuration via Dnspy, and using this information to pivot to additional servers utilising Shodan and Censys.
Malware Analysis Guides
Analysis of a Multi-Stage Loader for AgentTesla. Covering Ghidra, Dnspy, X32dbg, API Hashing and more!
Malware Analysis Guides
Using manual analysis to extract Amadey C2 information with Ghidra and x32dbg
Malware Analysis Guides
Manual analysis and deobfuscation of a .NET based Dcrat. Touching on Custom Python Scripts, Cyberchef and .NET analysis with Dnspy.