How To Write an OpenCTI Connector
Introduction As we already know, OpenCTI can be a powerful tool in our arsenal to aggregate and link components in our threat…
Introduction As we already know, OpenCTI can be a powerful tool in our arsenal to aggregate and link components in our threat…
The Art of Smuggling We all love some C2 action. I though it’ll be a cool idea to list C2…
Threat Intelligence – Hot Pursuit Threat intelligence is a rapidly evolving field, and staying up-to-date is crucial for protecting yourself…
Introduction OpenCTI is a great tool for threat intelligence. It can link and store huge amounts of data and give…
As we progress through our careers, it’s important to constantly strive for improvement and growth. Whether we’re looking to advance…
Amadey Malware Analysis – Part 1 Amadey is a malicious software that has been causing significant damage to computer systems…
Basic HTML Malware Loader – QuakBot Introduction I decided to do my first analysis on a HTML loader. To “worm…
REMnux Installation REMnux is a Linux-based distribution designed for reverse-engineering and analyzing malicious software. It is a toolkit for examining…
Having a good and reliable environment to perform our malware analysis research is crucial. Obviously, we do not want to…
When conducting a long time research, or when tracking threat groups, malware families, ransomware families, whatever it is, it makes…