Threat Intelligence Guides
Combining Pivot Points to Identify Malware Infrastructure - Redline, Smokeloader and Cobalt Strike
Identifying Malware infrastructure by combining weak pivot points.
Threat Intelligence Guides
Identifying Malware infrastructure by combining weak pivot points.
Threat Intelligence Guides
Identifying Simple pivot points in RisePro Stealer Infrastructure using Censys.
Threat Intelligence Guides
Threat Intelligence Queries with Censys.
Threat Intelligence Guides
An informal page for storing Censys/Shodan queries
Threat Intelligence Guides
Identifying Amadey Bot Servers Using Shodan.
Threat Intelligence Guides
Identification of Laplas infrastructure with Shodan and Censys.
Threat Intelligence Guides
Extraction of Quasar C2 configuration via Dnspy, and using this information to pivot to additional servers utilising Shodan and Censys.