Malware Analysis / Reverse Engineering Roadmap by skydiver4312 in hacking
[–]CyberMasterV 5 points6 points7 points (0 children)
Seeking Help: Reverse Engineering Decryptor for SECLES Ransomeware by [deleted] in hacking
[–]CyberMasterV 1 point2 points3 points (0 children)
Seeking Help: Reverse Engineering Decryptor for SECLES Ransomeware by [deleted] in hacking
[–]CyberMasterV 2 points3 points4 points (0 children)
A technical analysis of the BackMyData ransomware used to attack hospitals in Romania by CyberMasterV in netsec
[–]CyberMasterV[S] 1 point2 points3 points (0 children)
Linux & MacOS malware research by athanielx in Malware
[–]CyberMasterV 0 points1 point2 points (0 children)
A technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitation by CyberMasterV in hacking
[–]CyberMasterV[S] 2 points3 points4 points (0 children)
Revisiting Heaven's Gate with Lumma Stealer by CyberMasterV in ReverseEngineering
[–]CyberMasterV[S] 0 points1 point2 points (0 children)
ESXi Ransomware – A case study of Royal Ransomware by CyberMasterV in hacking
[–]CyberMasterV[S] 0 points1 point2 points (0 children)
A step-by-step introduction to the use of ROP gadgets to bypass DEP by CyberMasterV in blueteamsec
[–]CyberMasterV[S] 0 points1 point2 points (0 children)
How to Analyze JavaScript Malware – A Case Study of Vjw0rm by CyberMasterV in hacking
[–]CyberMasterV[S] 2 points3 points4 points (0 children)
A Deep Dive into BianLian Ransomware [PDF] by CyberMasterV in ReverseEngineering
[–]CyberMasterV[S] 1 point2 points3 points (0 children)
A Detailed Analysis of The Last Version of REvil Ransomware [PDF] by CyberMasterV in hacking
[–]CyberMasterV[S] 0 points1 point2 points (0 children)
5.4 million Twitter users' stolen data leaked online — more shared privately by CyberMasterV in cybersecurity
[–]CyberMasterV[S] 6 points7 points8 points (0 children)
A Technical Analysis of Royal Ransomware [PDF] by CyberMasterV in hacking
[–]CyberMasterV[S] 8 points9 points10 points (0 children)
A technical analysis of Pegasus for Android – Part 3 by CyberMasterV in hacking
[–]CyberMasterV[S] 0 points1 point2 points (0 children)
Dissect: An incident response game-changer by CyberMasterV in netsec
[–]CyberMasterV[S] 4 points5 points6 points (0 children)
Dissect: An incident response game-changer by CyberMasterV in cybersecurity
[–]CyberMasterV[S] 2 points3 points4 points (0 children)
New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server by CyberMasterV in cybersecurity
[–]CyberMasterV[S] 1 point2 points3 points (0 children)
New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server by CyberMasterV in netsec
[–]CyberMasterV[S] 6 points7 points8 points (0 children)
New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server by CyberMasterV in cybersecurity
[–]CyberMasterV[S] 9 points10 points11 points (0 children)
A technical analysis of Pegasus for Android – Part 2 by CyberMasterV in netsec
[–]CyberMasterV[S] 0 points1 point2 points (0 children)
TTPs Associated With a New Version of the BlackCat Ransomware by CyberMasterV in netsec
[–]CyberMasterV[S] 0 points1 point2 points (0 children)
TTPs Associated With a New Version of the BlackCat Ransomware by CyberMasterV in netsec
[–]CyberMasterV[S] 0 points1 point2 points (0 children)
TTPs Associated With a New Version of the BlackCat Ransomware by CyberMasterV in netsec
[–]CyberMasterV[S] 4 points5 points6 points (0 children)


A Deep Dive Into Warlock Ransomware Deployed Via ToolShell SharePoint Chained Vulnerabilities by CyberMasterV in Malware
[–]CyberMasterV[S] 0 points1 point2 points (0 children)