0xMrMagneziMalware Analysis — BumblebeeMalware Analysis about the Bumblebee Malware Family — gathered more than a 100 IOC’sMay 9May 9
0xMrMagneziMalware Analysis — FormbookFormbook malware specializes in stealing sensitive info by capturing keystrokes, clipboard, and form data from web browsers.Apr 12Apr 12
0xMrMagneziMalware Analysis — njRATMalware Analysis of the multi-stage njRAT Downloader, starting from a simple PowerPoint fileMar 18Mar 18
0xMrMagneziMalware Analysis — Cobalt StrikeMaster Malware Analysis techniques with a focus on Cobalt Strike, equipping yourself to combat sophisticated cyber threats effectively.Feb 29Feb 29
0xMrMagneziMalware Analysis — XwormXworm, a sophisticated Windows malware, that uses polymorphism, multi-staging, anti-debugging, and steganography.Feb 221Feb 221
0xMrMagneziMalware Analysis — Ramcos RATAnalysis of Ramcos RAT reveals cybercriminals’ sophisticated techniques to evade detection and gain remote access, showcasing modern…Feb 19Feb 19
0xMrMagneziMalware Analysis — AgentTeslaAgent Tesla is a widely-used remote access Trojan (RAT) known for its keylogging and data exfiltration capabilities, often used in cyber…Feb 15Feb 15