Date Author Title

OLE FILE

2015-07-12Didier StevensJump List Files Are OLE Files

OLE

2023-12-31/a>Tom WebbPi-Hole Pi4 Docker Deployment
2023-05-04/a>Xavier MertensInfostealer Embedded in a Word Document
2023-03-29/a>Didier StevensExtracting Multiple Streams From OLE Files
2023-03-16/a>Xavier MertensSimple Shellcode Dissection
2023-02-26/a>Didier Stevensoledump & MSI Files
2022-07-24/a>Didier StevensVideo: Maldoc: non-ASCII VBA Identifiers
2022-07-21/a>Didier StevensMaldoc: non-ASCII VBA Identifiers
2022-05-14/a>Didier StevensQuick Analysis Of Phishing MSG
2022-03-13/a>Didier StevensYARA 4.2.0 Released
2022-03-05/a>Didier Stevensoledump's Extra Option
2022-02-20/a>Didier StevensVideo: YARA's Console Module
2022-01-30/a>Didier StevensYARA's Console Module
2021-12-16/a>Brad DuncanHow the "Contact Forms" campaign tricks people
2021-10-21/a>Brad Duncan"Stolen Images Evidence" campaign pushes Sliver-based malware
2021-07-03/a>Didier StevensFinding Strings With oledump.py
2021-06-30/a>Johannes UllrichCVE-2021-1675: Incomplete Patch and Leaked RCE Exploit
2021-06-28/a>Didier StevensCFBF Files Strings Analysis
2021-06-24/a>Xavier MertensDo you Like Cookies? Some are for sale!
2021-06-20/a>Didier StevensVideo: oledump Cheat Sheet
2020-12-06/a>Didier Stevensoledump's Indicators (video)
2020-11-15/a>Didier Stevensoledump's ! Indicator
2020-11-08/a>Didier StevensQuick Tip: Extracting all VBA Code from a Maldoc
2020-10-12/a>Didier StevensNested .MSGs: Turtles All The Way Down
2020-10-11/a>Didier StevensAnalyzing MSG Files With plugin_msg_summary
2020-09-18/a>Xavier MertensA Mix of Python & VBA in a Malicious Word Document
2019-12-29/a>Guy BruneauELK Dashboard for Pihole Logs
2019-12-23/a>Didier StevensNew oledump.py plugin: plugin_version_vba
2019-12-07/a>Guy BruneauIntegrating Pi-hole Logs in ELK with Logstash
2019-11-25/a>Xavier MertensMy Little DoH Setup
2019-05-10/a>Xavier MertensDSSuite - A Docker Container with Didier's Tools
2019-02-26/a>Russ McReeAd Blocking With Pi Hole
2018-08-19/a>Didier StevensVideo: Peeking into msg files - revisited
2018-08-11/a>Didier StevensPeeking into msg files - revisited
2016-06-12/a>Guy BruneauDNS Sinkhole ISO Version 2.0
2016-03-07/a>Xavier MertensAnother Malicious Document, Another Way to Deliver Malicious Code
2015-07-12/a>Didier StevensJump List Files Are OLE Files
2015-07-04/a>Didier StevensA .BUP File Is An OLE File
2015-05-15/a>Didier StevensAnother Maldoc? I'm Afraid So...
2015-05-09/a>Didier StevensMalicious Word Document: This Time The Maldoc Is A MIME File
2015-02-20/a>Tom WebbFast analysis of a Tax Scam
2015-02-19/a>Daniel WesemannMacros? Really?!
2013-11-18/a>Johannes UllrichAm I Sending Traffic to a "Sinkhole"?
2013-05-04/a>Kevin ShorttThe Zero-Day Pendulum Swings
2012-11-16/a>Guy BruneauVMware security updates for vSphere API and ESX Service Console - http://www.vmware.com/security/advisories/VMSA-2012-0016.html
2012-01-21/a>Guy BruneauDNS Sinkhole Scripts Fixes/Update
2011-10-15/a>Guy BruneauDNS Sinkhole Parser Script Update
2011-09-09/a>Guy BruneauIPv6 and DNS Sinkhole
2010-10-28/a>Tony CarothersCyber Security Awareness Month - Day 28 - Role of the employee
2010-06-19/a>Guy BruneauDNS Sinkhole ISO Available for Download
2010-01-10/a>Guy BruneauEasy DNS BIND Sinkhole Setup

FILE

2024-09-16/a>Xavier MertensManaging PE Files With Overlays
2024-05-31/a>Xavier Mertens"K1w1" InfoStealer Uses gofile.io for Exfiltration
2023-11-20/a>Jesse La GrewOverflowing Web Honeypot Logs
2023-09-29/a>Xavier MertensAre You Still Storing Passwords In Plain Text Files?
2023-07-23/a>Guy BruneauInstall & Configure Filebeat on Raspberry Pi ARM64 to Parse DShield Sensor Logs
2023-06-09/a>Xavier MertensUndetected PowerShell Backdoor Disguised as a Profile File
2023-04-04/a>Johannes UllrichAnalyzing the efile.com Malware "efail"
2023-02-24/a>Brad DuncanURL files and WebDAV used for IcedID (Bokbot) infection
2023-01-21/a>Guy BruneauDShield Sensor JSON Log to Elasticsearch
2023-01-04/a>Rob VandenBrinkUpdate to RTRBK - Diff and File Dates in PowerShell
2022-12-20/a>Xavier MertensLinux File System Monitoring & Actions
2022-07-25/a>Xavier MertensPowerShell Script with Fileless Capability
2022-07-17/a>Didier StevensPython: Files In Use By Another Process
2022-06-25/a>Xavier MertensMalicious Code Passed to PowerShell via the Clipboard
2022-06-04/a>Guy BruneauSpam Email Contains a Very Large ISO file
2022-06-03/a>Xavier MertensSandbox Evasion... With Just a Filename!
2022-05-29/a>Didier StevensExtracting The Overlay Of A PE File
2022-05-28/a>Didier StevensHuge Signed PE File: Keeping The Signature
2022-05-26/a>Didier StevensHuge Signed PE File
2022-05-23/a>Johannes UllrichAttacker Scanning for jQuery-File-Upload
2022-05-20/a>Xavier MertensA 'Zip Bomb' to Bypass Security Controls & Sandboxes
2022-03-24/a>Xavier MertensMalware Delivered Through Free Sharing Tool
2021-09-11/a>Guy BruneauShipping to Elasticsearch Microsoft DNS Logs
2021-05-02/a>Didier StevensPuTTY And FileZilla Use The Same Fingerprint Registry Keys
2021-04-10/a>Guy BruneauBuilding an IDS Sensor with Suricata & Zeek with Logs to ELK
2021-03-12/a>Guy BruneauMicrosoft DHCP Logs Shipped to ELK
2021-02-12/a>Xavier MertensAgentTesla Dropped Through Automatic Click in Microsoft Help File
2020-06-12/a>Xavier MertensMalicious Excel Delivering Fileless Payload
2020-05-22/a>Didier StevensSome Strings to Remember
2020-05-04/a>Didier StevensSysmon and File Deletion
2020-03-21/a>Guy BruneauHoneypot - Scanning and Targeting Devices & Services
2019-10-03/a>Xavier Mertens"Lost_Files" Ransomware
2019-08-04/a>Didier Stevens Detecting ZLIB Compression
2019-02-19/a>Didier StevensIdentifying Files: Failure Happens
2018-11-05/a>Johannes UllrichStruts 2.3 Vulnerable to Two Year old File Upload Flaw
2017-11-29/a>Xavier MertensFileless Malicious PowerShell Sample
2017-10-30/a>Didier StevensPE files and debug info
2017-10-24/a>Xavier MertensStop relying on file extensions
2017-07-19/a>Xavier MertensBots Searching for Keys & Config Files
2017-07-02/a>Didier StevensPE Section Name Descriptions
2017-05-26/a>Lorna HutchesonFile2pcap - A new tool for your toolkit!
2016-08-24/a>Xavier MertensExample of Targeted Attack Through a Proxy PAC File
2016-05-21/a>Didier StevensPython Malware - Part 2
2016-03-30/a>Xavier MertensWhat to watch with your FIM?
2016-01-20/a>Xavier Mertens/tmp, %TEMP%, ~/Desktop, T:\, ... A goldmine for pentesters!
2015-07-12/a>Didier StevensJump List Files Are OLE Files
2014-03-17/a>Johannes UllrichScans for FCKEditor File Manager
2014-02-28/a>Daniel WesemannOversharing
2014-01-11/a>Guy Bruneautcpflow 1.4.4 and some of its most Interesting Features
2013-08-26/a>Alex StanfordStop, Drop and File Carve
2013-08-21/a>Alex StanfordPsst. Your Browser Knows All Your Secrets.
2011-11-28/a>Tom ListonA Puzzlement...
2011-08-15/a>Mark HofmanHow to find unwanted files on workstations
2009-12-28/a>Johannes Ullrich8 Basic Rules to Implement Secure File Uploads http://jbu.me/48 (inspired by IIS ; bug)
2009-08-13/a>Jim ClausingTools for extracting files from pcaps
2009-06-27/a>Tony CarothersNew NIAP Strategy on the Horizon
2009-05-27/a>donald smithHost file black lists
2009-05-25/a>Jim ClausingMore tools for (US) Memorial Day
2008-03-13/a>Jason LamRemote File Include spoof!?