The Proliferation of Ransomware (Part 1 in a Series on Ransomware)
*This blog entry was originally published on July 18, 2016 on the original Polito Blog by Roman Romanenco. It was re-posted on October 3,...
The Proliferation of Ransomware (Part 1 in a Series on Ransomware)
Unwrap Your Malware
Language Interpreters and Post-Exploitation
BurpSuite Yara Plugin
The Simplicity of VBA Malware (Part 2 of 2)
The Simplicity of VBA Malware (Part 1 of 2)
Analysis and Modification of Android Apps
Antivirus ... for Linux
Analysis of a Romanian Botnet
Running Metasploit Shellcode in a Process
Netcat Reverse Shell Fixup
AppLocker and Software Restriction Policies
Vulnerability Assessment vs. Penetration Test: Key Differences and Objectives
Prepare for Ransomware: Delivery and Defense (Part 3 in a Series on Ransomware)
Deconstructing the Ransomware Kill Chain (Part 2 in a Series on Ransomware)
The Proliferation of Ransomware (Part 1 in a Series on Ransomware)
Unwrap Your Malware
Language Interpreters and Post-Exploitation
BurpSuite Yara Plugin
The Simplicity of VBA Malware (Part 2 of 2)