Nasreddine BencherchaliPersistence With “Fiddler Classic” ExtensionsStop Fiddling AroundJun 16, 2022Jun 16, 2022
Nasreddine BencherchaliPersistence Using Windows Terminal “Profiles”Profiles All The Way DownJul 29, 2022Jul 29, 2022
ParitoshDLL Sideloading: A Closer Look at this Stealthy Attack TechniqueDLL sideloading is an attack technique that often flies under the radar, silently infiltrating systems and causing havoc. This technique…Oct 24, 2023Oct 24, 2023
Kelvin WinborneinSystem WeaknessAll Your Cred Are Belong to Us: AgentTesla Malware AnalysisNoob EditionOct 12, 20231Oct 12, 20231
Nasreddine BencherchaliHunting Malware with Windows Sysinternals — Process ExplorerHow to leverage process explorer capabilities to hunt and analyze malwareSep 23, 20201Sep 23, 20201
Nasreddine BencherchaliHunting Malware with Windows Sysinternals — Process MonitorHow to leverage Process Monitor functionalities to hunt and analyze malwareOct 2, 2020Oct 2, 2020