Malware

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to escalate privileges and move laterally…

3 weeks ago

Full Spectrum Event Tracing For Windows Detection In The kernel Against Rootkits

Sanctum EDR demonstrates a multi-layered approach to detecting and preventing Event Tracing for Windows (ETW) tampering by rootkits, combining kernel-mode…

3 weeks ago

SpyAI : Intelligent Malware With Advanced Capabilities

SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze screenshots from entire monitors. It…

4 weeks ago

MalDoc In PDF : A Novel Technique For Evading Detection

The cybersecurity community has recently been alerted to a sophisticated attack method known as "MalDoc in PDF," which involves embedding…

1 month ago

RunAs-Stealer : A Credential Stealing Tool

RunAs-Stealer is a sophisticated credential stealing tool that employs three distinct techniques to capture sensitive user information: Hooking CreateProcessWithLogonW, Smart…

1 month ago

BypassAV : Techniques To Evade Antivirus And EDR Systems

BypassAV refers to the collection of techniques and tools used to bypass antivirus (AV) and Endpoint Detection and Response (EDR)…

2 months ago

NailaoLoader : Hiding Execution Flow via Patching

NailaoLoader employs sophisticated techniques to obscure its execution flow, leveraging Windows Management Instrumentation (WMI) for lateral movement and file transfer.…

2 months ago

Ransomware Tool Matrix : The Arsenal Of Cyber Defense

The Ransomware Tool Matrix is a valuable repository designed to catalog tools commonly used by ransomware gangs and extortionist groups.…

2 months ago

BlackBasta Chat : The Inner Workings Of A Notorious Ransomware Group

The recent leak of Black Basta’s internal communications, spanning over 200,000 chat messages, has provided an unprecedented look into the…

2 months ago

LummaC2 Stealer : Unpacking The Threats Of A Marketed ‘Premium’ Malware

LummaC2 is a commodity malware designed as an information stealer, targeting browsers, cryptocurrency wallets, and authentication data. Marketed as a…

2 months ago