File Name
-
..——
-
2014-11-DKOM-PoC-Outline.pdf2.35MB2021-05-03 19:35:582014-12-DKOM-Interim-DKOM-PoC-Report.pdf1.48MB2021-05-03 19:35:592015-01-DKOM-Prolaco-Final-DKOM-PoC-Report.pdf245.52KB2021-05-03 19:35:592015-05-Mimikatz-PoC-Report.pdf2.00MB2021-05-03 19:35:592015-05-Pony-PoC-Report.pdf585.03KB2021-05-03 19:35:592015-06-Software_Restriction_Policy-PoC-Report.pdf140.16KB2021-05-03 19:35:592015-06-WMI-Persistence_Proof_of_Concept-Supplemental_Report.pdf232.15KB2021-05-03 19:35:592015-07-Mimikatz-Password_Scanning_Analysis.pdf142.67KB2021-05-03 19:35:592015-07-PoC-Anti_Debugging_and_Anti_Emulation.pdf2.97MB2021-05-03 19:36:002015-07-Sinowal-Web_Form_Scraping-PoC-Report.pdf237.67KB2021-05-03 19:36:002015-08-20150807-251-Symantec-ZeroAccess-Indepth.pdf161.49KB2021-05-03 19:36:002015-08-20150807-252-MIRcon-Something-About-WMI.pdf118.44KB2021-05-03 19:36:002015-08-20150807-253-TrendMicro-Understanding-WMI-Malware.pdf131.19KB2021-05-03 19:36:002015-08-20150807-254-CI-PLUGX7.pdf136.62KB2021-05-03 19:36:002015-08-20150807-255-SY-Buttrerfly.pdf132.77KB2021-05-03 19:36:002015-08-20150814-256-CSIR-15005-Stalker-Panda.pdf150.53KB2021-05-03 19:36:002015-08-20150814-257-CSIT-15016-Elirks-RAT.pdf136.99KB2021-05-03 19:36:002015-08-20150814-258-Symantec-Black_Vine.pdf158.75KB2021-05-03 19:36:002015-08-20150814-259-Eset-Liberpy.pdf119.59KB2021-05-03 19:36:002015-08-20150814-260-Eset-Potao.pdf127.75KB2021-05-03 19:36:002015-08-HeapDestroy-DLL-Rootkit-PoC-Report.pdf170.91KB2021-05-03 19:36:002015-08-McAfee-DLL-Hijack-PoC-Report.pdf238.41KB2021-05-03 19:36:012015-09-20150804-266-Symantec-Evolution_of_Ransomware.pdf133.45KB2021-05-03 19:36:012015-09-20150804-267-CanSecWest13-DEP-ASLR-WO-ROP-JIT.pdf122.33KB2021-05-03 19:36:012015-09-20150804-268-CSIT-15078-Skipper.pdf158.94KB2021-05-03 19:36:012015-09-20150821-261-CERT-EU-Kerberos_Golden_Ticket.pdf157.02KB2021-05-03 19:36:012015-09-20150821-263-NMehta-Theories_on_Persistence.pdf150.28KB2021-05-03 19:36:012015-09-20150821-264-TW-WildNeutron.pdf142.31KB2021-05-03 19:36:012015-09-20150821-265-VB-Dridex.pdf138.06KB2021-05-03 19:36:012015-09-20150828-269-CSIT-15079-Cozy_Bear.pdf121.80KB2021-05-03 19:36:012015-09-20150828-270-Dell_SecureWorks-Sakula.pdf120.43KB2021-05-03 19:36:012015-09-20150904-271-RSA-Terracotta-VPN.pdf154.02KB2021-05-03 19:36:012015-09-20150904-272-MalwareBytes-HanJuan_Drops_New_Tinba_Version.pdf160.39KB2021-05-03 19:36:012015-09-20150904-273-FireEye-Window_into_Russian_Cyber_Ops.pdf151.39KB2021-05-03 19:36:012015-09-20150904-274-SentinelOne-Rombertik.pdf144.42KB2021-05-03 19:36:012015-09-20150904-275-Cisco-Rombertik.pdf162.72KB2021-05-03 19:36:012015-09-20150911-276-Symantec-Regin.pdf167.63KB2021-05-03 19:36:012015-09-20150911-277-FireEye-HammerToss.pdf302.80KB2021-05-03 19:36:012015-09-20150911-278-VB-Gamker.pdf160.97KB2021-05-03 19:36:012015-09-20150911-279-CSIT-15083-HTTPBrowser.pdf140.56KB2021-05-03 19:36:012015-09-20150911-280-CSIT-15085-NfLog.pdf122.10KB2021-05-03 19:36:02