Certainly useful , mainly for fun, rougly inspired by 0x00 article Pentest use: fileless-xec is used on target machine to… Read More
Download GhostEmperor’s technical details (PDF) While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster… Read More
Check Point Research laid out details on financial trojans found embedded in at least ten Android-based apps by the same… Read More
This kind of destructive dropper is tricky to detect due to the fact its target is not to directly execute… Read More