Date Author Title

WEB SHELL

2013-06-25Bojan ZdrnjaThe race for resources
2009-07-05Bojan ZdrnjaMore on ColdFusion hacks

WEB

2024-11-06/a>Jesse La Grew[Guest Diary] Insights from August Web Traffic Surge
2024-01-22/a>Johannes UllrichApple Updates Everything - New 0 Day in WebKit
2024-01-08/a>Jesse La GrewWhat is that User Agent?
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-05-03/a>Xavier MertensIncreased Number of Configuration File Scans
2023-04-18/a>Johannes UllrichUDDIs are back? Attackers rediscovering old exploits.
2023-02-25/a>Didier StevensCrypto Inside a Browser
2023-02-24/a>Brad DuncanURL files and WebDAV used for IcedID (Bokbot) infection
2022-09-21/a>Xavier MertensPhishing Campaigns Use Free Online Resources
2022-08-23/a>Xavier MertensWho's Looking at Your security.txt File?
2022-08-17/a>Johannes UllrichApple Patches Two Exploited Vulnerabilities
2022-08-01/a>Johannes UllrichA Little DDoS In the Morning
2022-04-05/a>Johannes UllrichWebLogic Crypto Miner Malware Disabling Alibaba Cloud Monitoring Tools
2022-03-11/a>Xavier MertensKeep an Eye on WebSockets
2022-02-07/a>Johannes Ullrichweb3 phishing via self-customizing landing pages
2021-12-07/a>Johannes UllrichWebshells, Webshells everywhere!
2021-12-01/a>Xavier MertensInfo-Stealer Using webhook.site to Exfiltrate Data
2021-10-11/a>Johannes UllrichThings that go "Bump" in the Night: Non HTTP Requests Hitting Web Servers
2021-10-09/a>Guy BruneauScanning for Previous Oracle WebLogic Vulnerabilities
2021-06-24/a>Xavier MertensDo you Like Cookies? Some are for sale!
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2020-11-07/a>Guy BruneauCryptojacking Targeting WebLogic TCP/7001
2020-10-29/a>Johannes UllrichPATCH NOW: CVE-2020-14882 Weblogic Actively Exploited Against Honeypots
2020-08-10/a>Bojan ZdrnjaScoping web application and web service penetration tests
2020-07-24/a>Xavier MertensCompromized Desktop Applications by Web Technologies
2019-11-22/a>Xavier MertensAbusing Web Filters Misconfiguration for Reconnaissance
2019-09-24/a>Xavier MertensHuge Amount of remotewebaccess.com Sites Found in Certificate Transparency Logs
2019-08-28/a>Johannes Ullrich[Guest Diary] Open Redirect: A Small But Very Common Vulnerability
2019-08-01/a>Johannes UllrichWhat is Listening On Port 9527/TCP?
2019-06-19/a>Johannes UllrichCritical Actively Exploited WebLogic Flaw Patched CVE-2019-2729
2019-04-28/a>Johannes UllrichUpdate about Weblogic CVE-2019-2725 (Exploits Used in the Wild, Patch Status)
2019-04-25/a>Rob VandenBrinkUnpatched Vulnerability Alert - WebLogic Zero Day
2019-02-02/a>Guy BruneauScanning for WebDAV PROPFIND Exploiting CVE-2017-7269
2018-11-17/a>Xavier MertensQuickly Investigating Websites with Lookyloo
2018-07-20/a>Kevin ListonWeblogic Exploit Code Made Public (CVE-2018-2893)
2018-05-03/a>Renato MarinhoWebLogic Exploited in the Wild (Again)
2018-04-30/a>Remco VerhoefAnother approach to webapplication fingerprinting
2017-09-14/a>Xavier MertensAnother webshell, another backdoor!
2017-07-19/a>Xavier MertensBots Searching for Keys & Config Files
2017-06-01/a>Xavier MertensSharing Private Data with Webcast Invitations
2017-05-12/a>Xavier MertensWhen Bad Guys are Pwning Bad Guys...
2017-04-07/a>Xavier MertensTracking Website Defacers with HTTP Referers
2017-04-02/a>Guy BruneauIPFire - A Household Multipurpose Security Gateway
2017-02-28/a>Xavier MertensAnalysis of a Simple PHP Backdoor
2017-01-24/a>Johannes UllrichCritical Vulnerability in Cisco WebEx Chrome Plugin
2017-01-14/a>Xavier MertensBackup Files Are Good but Can Be Evil
2016-07-13/a>Xavier MertensThe Power of Web Shells
2016-01-29/a>Xavier MertensScripting Web Categorization
2015-06-25/a>Bojan ZdrnjaWeb security subtleties and exploitation of combined vulnerabilities
2015-04-23/a>Bojan ZdrnjaWhen automation does not help
2015-04-14/a>Johannes UllrichOdd POST Request To Web Honeypot
2014-08-16/a>Lenny ZeltserWeb Server Attack Investigation - Installing a Bot and Reverse Shell via a PHP Vulnerability
2014-08-09/a>Adrien de BeaupreComplete application ownage via Multi-POST XSRF
2014-06-11/a>Daniel WesemannGimme your keys!
2014-06-10/a>Daniel WesemannSampling Bias
2014-04-24/a>Rob VandenBrinkApple IOS updates to 7.1.1, OSX Security update 2014-002, Airport Updates - http://support.apple.com/kb/HT1222, http://support.apple.com/kb/HT6208, http://support.apple.com/kb/HT6207, http://support.apple.com/kb/HT6203
2014-04-11/a>Guy BruneauHeartbleed Fix Available for Download for Cisco Products
2014-04-07/a>Johannes UllrichAttack or Bad Link? Your Guess?
2014-01-17/a>Russ McReeMassive RFI scans likely a free web app vuln scanner rather than bots
2014-01-13/a>Johannes UllrichSpecial Webcast today: HTML5, Risky Business or Hidden Security Toolchest? https://www.sans.org/webcasts/html5-risky-business-hidden-security-tool-chest-mobile-web-app-authentication-97650
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2013-12-24/a>Daniel WesemannUnfriendly crontab additions
2013-11-02/a>Rick WannerProtecting Your Family's Computers
2013-10-04/a>Pedro BuenoCSAM: WebHosting BruteForce logs
2013-09-05/a>Rob VandenBrinkWhat's Next for IPS?
2013-07-27/a>Scott FendleyDefending Against Web Server Denial of Service Attacks
2013-06-25/a>Bojan ZdrnjaThe race for resources
2013-06-10/a>Johannes UllrichWhen Google isn't Google
2013-04-08/a>Johannes UllrichCleaning Up After the Leak: Hiding exposed web content
2013-03-26/a>Daniel WesemannHow your Webhosting Account is Getting Abused
2013-02-25/a>Johannes UllrichPunkspider enumerates web application vulnerabilities
2013-02-22/a>Johannes UllrichWhen web sites go bad: bible . org compromise
2013-01-25/a>Johannes UllrichVulnerability Scans via Search Engines (Request for Logs)
2012-10-26/a>Adam SwangerSecuring the Human Special Webcast - October 30, 2012
2012-09-08/a>Guy BruneauWebmin Input Validation Vulnerabilities
2012-08-13/a>Rick WannerInteresting scan for medical certification information...
2012-07-23/a>Johannes UllrichMost Anti-Privacy Web Browsing Tool Ever?
2012-03-11/a>Johannes UllrichAn Analysis of Jester's QR Code Attack. (Guest Diary)
2011-12-28/a>Daniel WesemannHash collisions vulnerability in web servers
2011-11-01/a>Russ McReeSecure languages & frameworks
2011-10-12/a>Adam SwangerWe are experiencing technical issues with the webcast. The webcast will start as soon as these issues are resolved.
2011-08-16/a>Johannes UllrichWhat are the most dangerous web applications and how to secure them?
2011-07-28/a>Johannes UllrichAnnouncing: The "404 Project"
2011-07-05/a>Raul SilesHelping Developers Understand Security - Spot the Vuln
2011-05-17/a>Johannes UllrichA Couple Days of Logs: Looking for the Russian Business Network
2011-05-14/a>Guy BruneauWebsense Study Claims Canada Next Hotbed for Cybercrime Web Hosting Activity
2011-05-11/a>Swa FrantzenTime to disable WebGL ?
2011-04-10/a>Raul SilesRecent security enhancements in web browsers (e.g. Google Chrome)
2011-04-01/a>John BambenekLizaMoon Mass SQL-Injection Attack Infected at least 500k Websites
2011-02-28/a>Deborah HalePossible Botnet Scanning
2011-02-01/a>Lenny ZeltserThe Importance of HTTP Headers When Investigating Malicious Sites
2010-12-18/a>Raul SilesGoogle Chrome (Stable and Beta) have been updated to 8.0.552.224 for all platforms (Chrome OS too). http://bit.ly/fW04cr
2010-12-12/a>Raul SilesNew trend regarding web application vulnerabilities?
2010-12-02/a>Kevin JohnsonRobert Hansen and our happiness
2010-11-18/a>Chris CarboniAll of your pages are belonging to us
2010-08-16/a>Raul SilesBlind Elephant: A New Web Application Fingerprinting Tool
2010-08-15/a>Manuel Humberto Santander PelaezPython to test web application security
2010-08-13/a>Tom ListonThe Strange Case of Doctor Jekyll and Mr. ED
2010-07-25/a>Rick WannerUpdated version of Mandiant's Web Historian
2010-07-21/a>Adrien de BeaupreUpdate on .LNK vulnerability
2010-07-20/a>Manuel Humberto Santander PelaezLNK vulnerability now with Metasploit module implementing the WebDAV method
2010-06-23/a>Scott FendleyOpera Browser Update
2010-06-15/a>Manuel Humberto Santander PelaeziPhone 4 Order Security Breach Exposes Private Information
2010-04-26/a>Raul SilesVulnerable Sites Database
2010-04-13/a>Adrien de BeaupreWeb App Testing Tools
2010-03-24/a>Johannes Ullrich".sys" Directories Delivering Driveby Downloads
2010-03-21/a>Scott FendleySkipfish - Web Application Security Tool
2010-03-08/a>Raul SilesSamurai WTF 0.8
2010-02-06/a>Guy BruneauOracle WebLogic Server Security Alert
2010-02-03/a>Johannes UllrichAnatomy of a Form Spam Campaign (in progress against isc.sans.org right now) https://blogs.sans.org/appsecstreetfighter/
2010-01-29/a>Johannes UllrichAnalyzing isc.sans.org weblogs, part 2, RFI attacks
2010-01-25/a>William Salusky"Bots and Spiders and Crawlers, be gone!" - or - "New Open Source WebAppSec tools, Huzzah!"
2010-01-20/a>Johannes UllrichWeathering the Storm Part 1: An analysis of our SANS ISC weblogs http://appsecstreetfighter.com
2010-01-08/a>Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)
2009-10-26/a>Johannes UllrichWeb honeypot Update
2009-10-20/a>Raul SilesWASC 2008 Statistics
2009-10-09/a>Rob VandenBrinkTHAWTE to discontinue free Email Certificate Services and Web of Trust Service
2009-09-18/a>Jason LamResults from Webhoneypot project
2009-09-16/a>Raul SilesReview the security controls of your Web Applications... all them!
2009-08-18/a>Deborah HaleDomain tcpdump.org unavailable
2009-08-18/a>Deborah HaleWebsite compromises - what's happening?
2009-08-17/a>Adrien de BeaupreYAMWD: Yet Another Mass Web Defacement
2009-08-01/a>Deborah HaleWebsite Warnings
2009-07-13/a>Adrien de BeaupreVulnerability in Microsoft Office Web Components Control Could Allow Remote Code Execution
2009-07-05/a>Bojan ZdrnjaMore on ColdFusion hacks
2009-06-11/a>Jason LamDshield Web Honeypot going beta
2009-05-27/a>donald smithWebDAV write-up
2009-05-26/a>Jason LamA new Web application security blog
2009-05-24/a>Raul SilesIIS admins, help finding WebDAV remotely using nmap
2009-05-21/a>Adrien de BeaupreIIS admins, help finding WebDAV
2009-05-20/a>Tom ListonWeb Toolz
2009-05-05/a>Bojan ZdrnjaEvery dot matters
2009-04-21/a>Bojan ZdrnjaWeb application vulnerabilities
2009-03-26/a>Mark HofmanWebhoneypot fun
2009-02-17/a>Jason LamDShield Web Honeypot - Alpha Preview Release
2009-01-12/a>William SaluskyWeb Application Firewalls (WAF) - Have you deployed WAF technology?
2008-12-01/a>Jason LamCall for volunteers - Web Honeypot Project
2008-11-20/a>Jason LamLarge quantity SQL Injection mitigation
2008-09-08/a>Raul SilesQuick Analysis of the 2007 Web Application Security Statistics
2008-08-19/a>Johannes UllrichA morning stroll through my web logs
2008-08-15/a>Jim ClausingWebEx ActiveX buffer overflow
2008-06-07/a>Jim ClausingFollowup to 'How do you monitor your website?'
2008-04-24/a>donald smithHundreds of thousands of SQL injections
2006-09-30/a>Swa FrantzenYellow: WebViewFolderIcon setslice exploit spreading

SHELL

2024-08-19/a>Xavier MertensDo you Like Donuts? Here is a Donut Shellcode Delivered Through PowerShell/Python
2024-08-14/a>Xavier MertensMultiple Malware Dropped Through MSI Package
2024-03-28/a>Xavier MertensFrom JavaScript to AsyncRAT
2024-02-09/a>Xavier MertensMSIX With Heavily Obfuscated PowerShell Script
2024-01-26/a>Xavier MertensA Batch File With Multiple Payloads
2024-01-12/a>Xavier MertensOne File, Two Payloads
2024-01-05/a>Rob VandenBrinkNetstat, but Better and in PowerShell
2024-01-03/a>Jan KoprivaInteresting large and small malspam attachments from 2023
2023-11-18/a>Xavier MertensQuasar RAT Delivered Through Updated SharpLoader
2023-09-09/a>Guy Bruneau?Anyone get the ASN of the Truck that Hit Me?!?: Creating a PowerShell Function to Make 3rd Party API Calls for Extending Honeypot Information [Guest Diary]
2023-08-03/a>Jan KoprivaFrom small LNK to large malicious BAT file with zero VT score
2023-07-28/a>Xavier MertensShellCode Hidden with Steganography
2023-06-29/a>Brad DuncanGuLoader- or DBatLoader/ModiLoader-style infection for Remcos RAT
2023-06-19/a>Xavier MertensMalware Delivered Through .inf File
2023-06-09/a>Xavier MertensUndetected PowerShell Backdoor Disguised as a Profile File
2023-05-17/a>Xavier MertensIncrease in Malicious RAR SFX files
2023-04-19/a>Rob VandenBrinkTaking a Bite Out of Password Expiry Helpdesk Calls
2023-03-30/a>Xavier MertensBypassing PowerShell Strong Obfuscation
2023-03-21/a>Didier StevensString Obfuscation: Character Pair Reversal
2023-03-16/a>Xavier MertensSimple Shellcode Dissection
2023-02-10/a>Xavier MertensObfuscated Deactivation of Script Block Logging
2023-01-17/a>Rob VandenBrinkFinding that one GPO Setting in a Pool of Hundreds of GPOs
2023-01-04/a>Rob VandenBrinkUpdate to RTRBK - Diff and File Dates in PowerShell
2022-12-28/a>Rob VandenBrinkPlaying with Powershell and JSON (and Amazon and Firewalls)
2022-11-09/a>Xavier MertensAnother Script-Based Ransomware
2022-10-31/a>Rob VandenBrinkNMAP without NMAP - Port Testing and Scanning with PowerShell
2022-10-17/a>Xavier MertensFileless Powershell Dropper
2022-10-07/a>Xavier MertensPowershell Backdoor with DGA Capability
2022-09-14/a>Xavier MertensEasy Process Injection within Python
2022-07-25/a>Xavier MertensPowerShell Script with Fileless Capability
2022-06-25/a>Xavier MertensMalicious Code Passed to PowerShell via the Clipboard
2022-06-22/a>Xavier MertensMalicious PowerShell Targeting Cryptocurrency Browser Extensions
2022-06-03/a>Xavier MertensSandbox Evasion... With Just a Filename!
2022-05-12/a>Rob VandenBrinkWhen Get-WebRequest Fails You
2022-04-25/a>Xavier MertensSimple PDF Linking to Malicious Content
2022-03-31/a>Johannes UllrichSpring Vulnerability Update - Exploitation Attempts CVE-2022-22965
2022-03-30/a>Johannes UllrichPossible new Java Spring Framework Vulnerability (Updated: not a Spring problem)
2022-03-30/a>Johannes UllrichJava Springtime Confusion: What Vulnerability are We Talking About
2022-03-11/a>Xavier MertensKeep an Eye on WebSockets
2022-02-23/a>Johannes UllrichThe Rise and Fall of log4shell
2022-01-22/a>Xavier MertensMixed VBA & Excel4 Macro In a Targeted Excel Sheet
2022-01-20/a>Xavier MertensRedLine Stealer Delivered Through FTP
2022-01-17/a>Johannes UllrichLog4Shell Attacks Getting "Smarter"
2022-01-06/a>Xavier MertensMalicious Python Script Targeting Chinese People
2021-12-23/a>Johannes Ullrichlog4shell and cloud provider internal meta data services (IMDS)
2021-12-23/a>Johannes UllrichDefending Cloud IMDS Against log4shell (and more)
2021-12-21/a>Xavier MertensMore Undetected PowerShell Dropper
2021-12-15/a>Xavier MertensSimple but Undetected PowerShell Backdoor
2021-12-14/a>Johannes UllrichLog4j: Getting ready for the long haul (CVE-2021-44228)
2021-12-11/a>Johannes UllrichLog4j / Log4Shell Followup: What we see and how to defend (and how to access our data)
2021-12-10/a>Xavier MertensPython Shellcode Injection From JSON Data
2021-12-10/a>Bojan ZdrnjaRCE in log4j, Log4Shell, or how things can get bad quickly
2021-12-07/a>Johannes UllrichWebshells, Webshells everywhere!
2021-11-15/a>Rob VandenBrinkChanging your AD Password Using the Clipboard - Not as Easy as You'd Think!
2021-10-18/a>Xavier MertensMalicious PowerShell Using Client Certificate Authentication
2021-10-01/a>Xavier MertensNew Tool to Add to Your LOLBAS List: cvtres.exe
2021-08-20/a>Xavier MertensWaiting for the C2 to Show Up
2021-08-09/a>Jan KoprivaProxyShell - how many Exchange servers are affected and where are they?
2021-05-28/a>Xavier MertensMalicious PowerShell Hosted on script.google.com
2021-05-18/a>Xavier MertensFrom RunDLL32 to JavaScript then PowerShell
2021-05-06/a>Xavier MertensAlternative Ways To Perform Basic Tasks
2021-04-08/a>Xavier MertensSimple Powershell Ransomware Creating a 7Z Archive of your Files
2021-02-12/a>Xavier MertensAgentTesla Dropped Through Automatic Click in Microsoft Help File
2021-02-01/a>Rob VandenBrinkTaking a Shot at Reverse Shell Attacks, CNC Phone Home and Data Exfil from Servers
2021-01-21/a>Xavier MertensPowershell Dropping a REvil Ransomware
2021-01-18/a>Didier StevensDoc & RTF Malicious Document
2021-01-10/a>Didier StevensMaldoc Analysis With CyberChef
2021-01-09/a>Didier StevensMaldoc Strings Analysis
2020-12-24/a>Xavier MertensMalicious Word Document Delivering an Octopus Backdoor
2020-11-30/a>Didier StevensDecrypting PowerShell Payloads (video)
2020-11-25/a>Xavier MertensLive Patching Windows API Calls Using PowerShell
2020-11-19/a>Xavier MertensPowerShell Dropper Delivering Formbook
2020-11-05/a>Xavier MertensDid You Spot "Invoke-Expression"?
2020-09-24/a>Xavier MertensParty in Ibiza with PowerShell
2020-09-23/a>Xavier MertensMalicious Word Document with Dynamic Content
2020-09-11/a>Rob VandenBrinkWhat's in Your Clipboard? Pillaging and Protecting the Clipboard
2020-09-02/a>Xavier MertensPython and Risky Windows API Calls
2020-08-28/a>Xavier MertensExample of Malicious DLL Injected in PowerShell
2020-08-20/a>Rob VandenBrinkOffice 365 Mail Forwarding Rules (and other Mail Rules too)
2020-08-06/a>Xavier MertensA Fork of the FTCode Powershell Ransomware
2020-08-03/a>Xavier MertensPowershell Bot with Multiple C2 Protocols
2020-07-27/a>Didier StevensAnalyzing Metasploit ASP .NET Payloads
2020-07-19/a>Guy BruneauScanning Activity for ZeroShell Unauthenticated Access
2020-06-12/a>Xavier MertensMalicious Excel Delivering Fileless Payload
2020-05-15/a>Rob VandenBrinkHashes in PowerShell
2020-05-15/a>Rob VandenBrinkSHA3 Hashes (on Windows) - Where Art Thou?
2020-04-27/a>Xavier MertensPowershell Payload Stored in a PSCredential Object
2020-04-24/a>Xavier MertensMalicious Excel With a Strong Obfuscation and Sandbox Evasion
2020-04-17/a>Xavier MertensWeaponized RTF Document Generator & Mailer in PowerShell
2020-04-10/a>Xavier MertensPowerShell Sample Extracting Payload From SSL
2020-02-28/a>Xavier MertensShow me Your Clipboard Data!
2020-01-23/a>Xavier MertensComplex Obfuscation VS Simple Trick
2019-12-26/a>Xavier MertensBypassing UAC to Install a Cryptominer
2019-12-09/a>Didier Stevens(Lazy) Sunday Maldoc Analysis
2019-10-27/a>Didier StevensUsing scdbg to Find Shellcode
2019-10-25/a>Rob VandenBrinkMore on DNS Archeology (with PowerShell)
2019-09-17/a>Rob VandenBrinkInvestigating Gaps in your Windows Event Logs
2019-07-28/a>Didier StevensVideo: Analyzing Compressed PowerShell Scripts
2019-07-11/a>Xavier MertensRussian Dolls Malicious Script Delivering Ursnif
2019-07-10/a>Rob VandenBrinkDumping File Contents in Hex (in PowerShell)
2019-06-28/a>Rob VandenBrinkVerifying Running Processes against VirusTotal - Domain-Wide
2019-06-27/a>Rob VandenBrinkFinding the Gold in a Pile of Pennies - Long Tail Analysis in PowerShell
2019-06-21/a>Rob VandenBrinkNetstat Local and Remote -new and improved, now with more PowerShell!
2019-06-03/a>Didier StevensTip: BASE64 Encoded PowerShell Scripts are Recognizable by the Amount of Letter As
2019-05-31/a>Didier StevensRetrieving Second Stage Payload with Ncat
2019-05-30/a>Didier StevensAnalyzing First Stage Shellcode
2019-05-28/a>Didier StevensOffice Document & BASE64? PowerShell!
2019-04-25/a>Rob VandenBrinkService Accounts Redux - Collecting Service Accounts with PowerShell
2019-04-24/a>Rob VandenBrinkWhere have all the Domain Admins gone? Rooting out Unwanted Domain Administrators
2019-04-04/a>Xavier MertensNew Waves of Scans Detected by an Old Rule
2019-03-30/a>Didier Stevens"404" is not Malware
2019-03-20/a>Rob VandenBrinkUsing AD to find hosts that aren't in AD - fun with the [IPAddress] construct!
2019-03-10/a>Didier StevensMalicious HTA Analysis by a Reader
2019-03-10/a>Didier StevensQuick and Dirty Malicious HTA Analysis
2019-03-05/a>Rob VandenBrinkPowershell, Active Directory and the Windows Host Firewall
2019-02-21/a>Xavier MertensSimple Powershell Keyloggers are Back
2019-02-17/a>Didier StevensVideo: Finding Property Values in Office Documents
2019-02-16/a>Didier StevensFinding Property Values in Office Documents
2019-02-10/a>Didier StevensVideo: Maldoc Analysis of the Weekend
2019-02-09/a>Didier StevensMaldoc Analysis of the Weekend
2019-01-24/a>Brad DuncanMalspam with Word docs uses macro to run Powershell script and steal system data
2019-01-14/a>Rob VandenBrinkMicrosoft LAPS - Blue Team / Red Team
2019-01-02/a>Xavier MertensMalicious Script Leaking Data via FTP
2019-01-02/a>Didier StevensMaldoc with Nonfunctional Shellcode
2018-12-19/a>Xavier MertensRestricting PowerShell Capabilities with NetSh
2018-12-15/a>Didier StevensDe-DOSfuscation Example
2018-12-12/a>Didier StevensYet Another DOSfuscation Sample
2018-12-03/a>Didier StevensWord maldoc: yet another place to hide a command
2018-11-27/a>Xavier MertensMore obfuscated shell scripts: Fake MacOS Flash update
2018-11-26/a>Xavier MertensObfuscated bash script targeting QNap boxes
2018-11-22/a>Xavier MertensDivided Payload in Multiple Pasties
2018-11-16/a>Xavier MertensBasic Obfuscation With Permissive Languages
2018-11-06/a>Xavier MertensMalicious Powershell Script Dissection
2018-10-26/a>Xavier MertensDissecting Malicious Office Documents with Linux
2018-10-22/a>Xavier MertensMalicious Powershell using a Decoy Picture
2018-09-30/a>Didier StevensWhen DOSfuscation Helps...
2018-09-24/a>Didier StevensAnalyzing Encoded Shellcode with scdbg
2018-09-08/a>Didier StevensVideo: Using scdbg to analyze shellcode
2018-09-05/a>Xavier MertensMalicious PowerShell Compiling C# Code on the Fly
2018-09-03/a>Didier StevensAnother quickie: Using scdbg to analyze shellcode
2018-08-31/a>Jim ClausingQuickie: Using radare2 to disassemble shellcode
2018-07-30/a>Didier StevensMalicious Word documents using DOSfuscation
2018-07-26/a>Xavier MertensWindows Batch File Deobfuscation
2018-06-19/a>Xavier MertensPowerShell: ScriptBlock Logging... Or Not?
2018-06-04/a>Rob VandenBrinkDigging into Authenticode Certificates
2018-05-19/a>Xavier MertensMalicious Powershell Targeting UK Bank Customers
2018-05-09/a>Xavier MertensNice Phishing Sample Delivering Trickbot
2018-05-06/a>Guy BruneauScans Attempting to use PowerShell to Download PHP Script
2018-03-04/a>Xavier MertensThe Crypto Miners Fight For CPU Cycles
2017-11-29/a>Xavier MertensFileless Malicious PowerShell Sample
2017-11-15/a>Xavier MertensIf you want something done right, do it yourself!
2017-11-11/a>Xavier MertensKeep An Eye on your Root Certificates
2017-10-31/a>Xavier MertensSome Powershell Malicious Code
2017-09-14/a>Xavier MertensAnother webshell, another backdoor!
2017-09-11/a>Russ McReeWindows Auditing with WINspect
2017-08-23/a>Xavier MertensMalicious script dropping an executable signed by Avast?
2017-08-20/a>Didier StevensIt's Not An Invoice ...
2017-08-01/a>Rob VandenBrinkRooting Out Hosts that Support Older Samba Versions
2017-05-12/a>Xavier MertensWhen Bad Guys are Pwning Bad Guys...
2017-05-03/a>Bojan ZdrnjaPowershelling with exploits
2017-03-30/a>Xavier MertensDiverting built-in features for the bad
2017-02-28/a>Xavier MertensAnalysis of a Simple PHP Backdoor
2017-02-17/a>Rob VandenBrinkRTRBK - Router / Switch / Firewall Backups in PowerShell (tool drop)
2016-12-02/a>Rob VandenBrinkProtecting Powershell Credentials (NOT)
2016-11-24/a>Didier StevensExtracting Shellcode From JavaScript
2016-11-23/a>Tom WebbMapping Attack Methodology to Controls
2016-11-18/a>Didier StevensVBA Shellcode and Windows 10
2016-10-31/a>Russ McReeSEC505 DFIR capture script: snapshot.ps1
2016-07-13/a>Xavier MertensThe Power of Web Shells
2016-06-03/a>Tom ListonMySQL is YourSQL
2016-04-28/a>Rob VandenBrinkDNS and DHCP Recon using Powershell
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2016-01-26/a>Rob VandenBrinkPentest Time Machine: NMAP + Powershell + whatever tool is next
2016-01-25/a>Rob VandenBrinkAssessing Remote Certificates with Powershell
2016-01-19/a>Rob VandenBrinkPowershell and HTTPS ? It Ain?t All Rainbows And Lollipops! (or is it?)
2016-01-06/a>Russ McReetoolsmith #112: Red vs Blue - PowerSploit vs PowerForensics
2015-12-14/a>Russ McReeAD Security's Unofficial Guide to Mimikatz & Command Reference
2015-12-10/a>Rob VandenBrinkUninstalling Problem Applications using Powershell
2015-12-09/a>Xavier MertensEnforcing USB Storage Policy with PowerShell
2015-12-02/a>Rob VandenBrinkNessus and Powershell is like Chocolate and Peanut Butter!
2015-08-12/a>Rob VandenBrinkWindows Service Accounts - Why They're Evil and Why Pentesters Love them!
2015-06-29/a>Rob VandenBrinkThe Powershell Diaries 2 - Software Inventory
2015-06-24/a>Rob VandenBrinkThe Powershell Diaries - Finding Problem User Accounts in AD
2015-03-30/a>Didier StevensYARA Rules For Shellcode
2015-02-03/a>Johannes UllrichAnother Network Forensic Tool for the Toolbox - Dshell
2014-10-24/a>Kevin ListonShellshock via SMTP
2014-10-23/a>Russ McReeDigest: 23 OCT 2014
2014-10-06/a>Johannes UllrichShellshock: More details released about CVE-2014-6277 and CVE-2014-6278. Also: Does Windows have a shellshock problem?
2014-10-01/a>Russ McReeSecurity Onion news: Updated ShellShock detection scripts for Bro
2014-09-29/a>Johannes UllrichApple Released Update to Fix Shellshock Vulnerability http://support.apple.com/kb/DL1769
2014-09-25/a>Johannes UllrichUpdate on CVE-2014-6271: Vulnerability in bash (shellshock)
2014-04-06/a>Basil Alawi S.Taher"Power Worm" PowerShell based Malware
2013-10-26/a>Guy BruneauActive Perl/Shellbot Trojan
2013-06-25/a>Bojan ZdrnjaThe race for resources
2013-02-28/a>Daniel WesemannParsing Windows Eventlogs in Powershell
2012-04-25/a>Daniel WesemannBlacole's shell code
2011-11-10/a>Rob VandenBrinkStuff I Learned Scripting - - Parsing XML in a One-Liner
2009-10-17/a>Rick WannerCyber Security Awareness Month - Day 17 - Port 22/SSH
2009-07-05/a>Bojan ZdrnjaMore on ColdFusion hacks