Date Author Title

COMMAND LINE

2018-07-30Xavier MertensExploiting the Power of Curl
2018-05-02Russ McReeWindows Commands Reference - An InfoSec Must Have
2016-04-15Xavier MertensWindows Command Line Persistence?
2010-01-27Raul SilesCommand Line Kung Fu

COMMAND

2024-07-10/a>Jesse La GrewFinding Honeypot Data Clusters Using DBSCAN: Part 1
2024-04-29/a>Johannes UllrichD-Link NAS Device Backdoor Abused
2023-06-11/a>Guy BruneauDShield Honeypot Activity for May 2023
2021-02-13/a>Guy BruneauvSphere Replication updates address a command injection vulnerability (CVE-2021-21976) - https://www.vmware.com/security/advisories/VMSA-2021-0001.html
2021-02-05/a>Xavier MertensVBA Macro Trying to Alter the Application Menus
2020-02-14/a>Xavier MertensKeep an Eye on Command-Line Browsers
2019-07-16/a>Russ McReeCommando VM: The Complete Mandiant Offensive VM
2018-07-30/a>Xavier MertensExploiting the Power of Curl
2018-05-02/a>Russ McReeWindows Commands Reference - An InfoSec Must Have
2016-07-26/a>Johannes UllrichCommand and Control Channels Using "AAAA" DNS Records
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2015-10-12/a>Guy BruneauCritical Vulnerability in Multiple Cisco Products - Apache Struts 2 Command Execution http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20131023-struts2
2013-02-17/a>Guy BruneauHP ArcSight Connector Appliance and Logger Vulnerabilities
2010-02-06/a>Guy BruneauLANDesk Management Gateway Vulnerability
2010-01-27/a>Raul SilesCommand Line Kung Fu

LINE

2024-08-26/a>Xavier MertensFrom Highly Obfuscated Batch File to XWorm and Redline
2024-08-14/a>Xavier MertensMultiple Malware Dropped Through MSI Package
2023-11-15/a>Xavier MertensRedline Dropped Through MSIX Package
2022-09-15/a>Xavier MertensMalicious Word Document with a Frameset
2022-07-25/a>Xavier MertensPowerShell Script with Fileless Capability
2022-01-20/a>Xavier MertensRedLine Stealer Delivered Through FTP
2021-11-10/a>Xavier MertensShadow IT Makes People More Vulnerable to Phishing
2021-01-02/a>Guy BruneauProtecting Home Office and Enterprise in 2021
2018-07-30/a>Xavier MertensExploiting the Power of Curl
2018-05-02/a>Russ McReeWindows Commands Reference - An InfoSec Must Have
2017-12-14/a>Russ McReeSecurity Planner: Improve your online safety
2017-10-18/a>Renato MarinhoBaselining Servers to Detect Outliers
2017-07-24/a>Russell EubanksTrends Over Time
2016-10-08/a>Russell EubanksUnauthorized Change Detected!
2016-04-15/a>Xavier MertensWindows Command Line Persistence?
2014-09-27/a>Guy BruneauWhat has Bash and Heartbleed Taught Us?
2012-11-26/a>John BambenekOnline Shopping for the Holidays? Tips, News and a Fair Warning
2012-06-22/a>Kevin ListonInvestigator's Tool-kit: Timeline
2010-10-04/a>Mark HofmanOnline Voting
2010-06-07/a>Manuel Humberto Santander PelaezSoftware Restriction Policy to keep malware away
2010-01-27/a>Raul SilesCommand Line Kung Fu
2010-01-08/a>Rob VandenBrinkMicrosoft OfficeOnline, Searching for Trust and Malware