Forums
New posts
Search forums
News
Security News
Technology News
Giveaways
Giveaways, Promotions and Contests
Discounts & Deals
Reviews
Users Reviews
Video Reviews
Support
Windows Malware Removal Help & Support
Inactive Support Threads
Mac Malware Removal Help & Support
Mobile Malware Removal Help & Support
Blog
Log in
Register
What's new
Search
Everywhere
Threads
This forum
Search titles only
By:
Everywhere
Threads
This forum
Search titles only
By:
Malware Analysis
Discussions for the current threat landscape and malicious code analysis. No direct links to malware or samples. Not suitable for
Malware Removal
.
Post thread
Menu
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Forums
Security
Search by Label
All threads
By Staff
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
Sub Forum
Malware Analysis Archive
Malware Analysis
Capcut fake stealer
Jul 19, 2023
silversurfer
Prev
1
2
3
4
5
Next
First
Prev
2 of 5
Go to page
Go
Next
Last
Prefix:
Malware Analysis
Filters
Show only:
Loading…
Title
(No prefix)
(No prefix)
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
(No prefix)
Question
Reverse Engineering
Malware Analysis
Social Engineering
Scam
Ransomware
Cybercrime
Locked
Malware Analysis
APT-C-08 CHM Malicious
ShenguiTurmi
Aug 1, 2023
Replies
2
Views
1,130
Aug 4, 2023
Sandbox Breaker
L
Malware Analysis
Sus files(2)
likeastar20
Jul 10, 2023
Replies
10
Views
1,346
Jul 10, 2023
struppigel
Locked
Malware Analysis
[Video] Unpacking Ageostealer built with Electron Framework
struppigel
Jul 2, 2023
Replies
7
Views
2,152
Jul 3, 2023
likeastar20
L
Malware Analysis
Analyze suspicious files and URLs with the free SophosLabs Intelix portal
Kongo
Jun 18, 2023
Replies
8
Views
1,301
Jun 20, 2023
Sandbox Breaker
Malware Analysis
[Video] Auto Start Monitoring and Disinfection with Autoruns
struppigel
May 21, 2023
Replies
0
Views
763
May 21, 2023
struppigel
Malware Analysis
[Video] 3CX SmoothOperator C2 extraction
struppigel
Apr 7, 2023
Replies
1
Views
894
Apr 7, 2023
Trident
Malware Analysis
[Video] 3CX SmoothOperator Authenticode Abuse
struppigel
Apr 5, 2023
Replies
0
Views
682
Apr 5, 2023
struppigel
Malware Analysis
[Video] Analysis of 3CX SmoothOperator ffmpeg.dll with Binary Ninja
struppigel
Apr 3, 2023
Replies
0
Views
828
Apr 3, 2023
struppigel
Malware Analysis
Is this installer legit?
Moonhorse
Jan 15, 2023
Replies
11
Views
1,577
Mar 6, 2023
upnorth
Malware Analysis
Security Researchers Breached Server of Russia's 'Black Basta' Ransomware Gang
vtqhtr413
Jan 30, 2023
Replies
1
Views
904
Mar 4, 2023
Bot
Malware Analysis
Hunting Insider Threats on the Dark Web
vtqhtr413
Jan 24, 2023
Replies
1
Views
761
Jan 26, 2023
Dave Russo
Locked
Malware Analysis
Suspicious Malware under PDF
Chipicao
Jan 13, 2023
Replies
17
Views
3,201
Jan 17, 2023
upnorth
Malware Analysis
PyPI Malware Creators are starting to Employ Anti-Debug techniques
upnorth
Jan 3, 2023
Replies
0
Views
932
Jan 3, 2023
upnorth
Malware Analysis
Decrypt NighHawk Strings with Ghidra Scripting [Video]
struppigel
Dec 4, 2022
Replies
0
Views
697
Dec 4, 2022
struppigel
Malware Analysis
IDAPython script to decode NightHawk strings
struppigel
Nov 25, 2022
Replies
0
Views
843
Nov 25, 2022
struppigel
Malware Analysis
Identifying File Manipulation in System Files
struppigel
Sep 22, 2022
Replies
0
Views
749
Sep 22, 2022
struppigel
Malware Analysis
Malware Detection Issues, Challenges, and Future Directions: A Survey
Andy Ful
Sep 3, 2022
Replies
12
Views
1,626
Sep 7, 2022
struppigel
Malware Analysis
Who Needs Macros? Threat Actors Pivot to Abusing Explorer and Other LOLBins via Windows Shortcuts
upnorth
Aug 8, 2022
Replies
0
Views
1,126
Aug 8, 2022
upnorth
Malware Analysis
Manjusaka : A Chinese sibling of Sliver and Cobalt Strike
upnorth
Aug 3, 2022
Replies
0
Views
999
Aug 3, 2022
upnorth
Malware Analysis
Using process creation properties to catch evasion techniques
Andy Ful
Jul 20, 2022
Replies
3
Views
1,014
Jul 20, 2022
Andy Ful
Prev
1
2
3
4
5
Next
First
Prev
2 of 5
Go to page
Go
Next
Last
Top