This is a "living" document which means I will update it once in a while to add new intresting URLs I come across. Some people collect silver, coins or dolls. I guess I collect links.
- Like humans, chimps often perform tasks differently when crowds are watching - https://archive.ph/FyZbf
- Meet the ancient 'big head' people: Scientists uncover a 'lost' human in Asia with an abnormally large skull that lived alongside homo sapiens 100,000 years ago - https://archive.ph/xhVSm
- Humans and Neanderthals Lived Side by Side in Northern Europe 45,000 Years Ago, Study Finds - https://archive.ph/p3xOt
- Thirteen Discoveries Made About Human Evolution in 2023 - https://archive.ph/dVbDG
- Meet Homo Juluensis, Your New Big-Headed Ancient Ancestor - https://archive.ph/yUhyF
- Scientists Discovered a New Human Species That Defies Conventional Wisdom - https://archive.ph/ZrNa5
- Scientists generate the first complete chromosome sequences from non-human primates - https://archive.ph/ThPAZ
- How an Ancient Human Species Formed Family Ties - https://archive.ph/x4rKx
- 65,000-year-old hearth in Gibraltar may have been a Neanderthal 'glue factory,' study finds - https://archive.ph/mlqaW
- The most ancient human genome yet has been sequenced—and it’s a Denisovan’s - https://archive.ph/8wuss
- After 50 Years, Scientists Still Love Lucy - https://archive.ph/WdlXp
- Neanderthals and early Homo sapiens buried their dead differently, study suggests - https://archive.ph/M4AZk
- We're closer to re-creating the sounds of Parasaurolophus - https://archive.ph/7LzWt
- Mafia-Aided Scheme Evades Millions in Gas Taxes - https://archive.ph/YcGNG
- Cyberbanging: Street Gangs Employ Social Media As A Recruiting Tool - https://archive.ph/iNlyB
- Hoping to revive mammoths, scientists create 'woolly mice' - https://archive.ph/9yFJH
- This is your brain. This is your brain on code - https://archive.ph/XSoyM
- 1.4 million-year-old jaw that was 'a bit weird for Homo' turns out to be from never-before-seen human relative - https://archive.ph/RUan6 The hidden brain power behind programming - https://archive.ph/8hfcC
- Street gangs turn to high-tech cybercrime to make a living - https://archive.ph/AwAKo
- In the Hood: Street Gangs Discover White-Collar Crime - https://archive.ph/9xSfZ
- How the Mafia Is Pivoting to Cybercrime - https://archive.ph/AOEsR
- Europol: Italian Mafia Tied to Cybercriminals Responsible for €10 Million in Cyberattacks - https://archive.ph/SxTEE
- Benjamin Franklin Printed Money With a Special Dye and Innovative Techniques to Thwart Counterfeiters, New Research Finds - https://archive.ph/b3JNt
- How Do People Who Are Blind or Visually Impaired Identify Money? - https://archive.ph/lwy6Z
- Why Were There So Many Skeletons Hidden in Benjamin Franklin’s Basement? - https://archive.ph/yDKjU
- Anticounterfeiting secrets of Benjamin Franklin’s paper money revealed - https://archive.ph/hQJwy
- Ben Franklin Lives in Your Smartphone - https://archive.ph/LEHYG
- Fact: Millennials Didn’t Invent Selfies—This Guy Did - https://archive.ph/2gTcp
- Case Files: Nikola Tesla - https://archive.ph/R5nkb
- Nikola Tesla and the Tower That Became His ‘Million Dollar Folly’ - https://archive.ph/R1QnZ
- Venting Doesn't Reduce Anger, But Something Else Does, Study Shows - https://archive.ph/MCwAH
- How emoji can kill: As gangs move online, social media fuel violence - https://archive.ph/OFxcT#selection-335.1-335.5
- AI Doesn’t Change Why Kids Should Learn to Code - https://archive.ph/Fl6Md
- DEF CON 19 - Matt 'openfly' Joyce - The Art of Trolling - https://www.youtube.com/watch?v=vcAHbvTlpKA
- DEFCON 20: Owning Bad Guys {And Mafia} with Javascript Botnets - https://www.youtube.com/watch?v=0QT4YJn7oVI
- Defcon 21 - How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers - https://www.youtube.com/watch?v=sgz5dutPF8M
- DEFCON 17: Search And Seizure Explained - They Took My Laptop! - https://www.youtube.com/watch?v=ibQGWXfWc7c
- DEFCON 17: That Awesome Time I Was Sued For Two Billion Dollars - https://www.youtube.com/watch?v=KSWqx8goqSY
- DEF CON 32 - Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ - Joseph Cox - https://www.youtube.com/watch?v=uFyk5UOyNqI
- DEF CON 24 SE Village - Chris Hadnagy - 7 Jedi Mind Tricks: Influence Your Target without a Word - https://www.youtube.com/watch?v=VFnCRVWBISY
- Defcon 21 - Social Engineering: The Gentleman Thief - https://www.youtube.com/watch?v=1kkOKvPrdZ4
- DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio - https://www.youtube.com/watch?v=dLOUzF6_Y54
- DEF CON 31 War Stories - Tracking the Worlds Dumbest Cyber Mercenaries - Cooper Quintin - https://www.youtube.com/watch?v=zccAvgC4UxU
- DEF CON 26 - Fuzzing Malware For Fun & Profit - Find and Exploit Bugs in Modern Malware - https://www.youtube.com/watch?v=JnKFqt6P6Io
- DEF CON 22 - Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught - https://www.youtube.com/watch?v=eQ2OZKitRwc
- DEF CON 22 - Michael Ossmann - The NSA Playset: RF Retroreflectors - https://www.youtube.com/watch?v=mAai6dRAtFo
- DEF CON 26 - Rob Joyce - NSA Talks Cybersecurity - https://www.youtube.com/watch?v=gmgV4r25XxA
- DEF CON 23 - Robinson and Mitchell - Knocking my neighbors kids cruddy drone offline - https://www.youtube.com/watch?v=5CzURm7OpAA
- DEF CON 18 By Zoz - Pwned By The Owner - https://www.youtube.com/watch?v=njTCH5rKwnc
- DEF CON 24 - regilero - Hiding Wookiees in HTTP: HTTP smuggling - https://www.youtube.com/watch?v=dVU9i5PsMPY
- DEFCON 16: Toying with Barcodes - https://www.youtube.com/watch?v=qT_gwl1drhc
- Massscanning the Internet - Defcon 22 (2014) - https://www.youtube.com/watch?v=UOWexFaRylM
- Fyodor - Nmap: Scanning The Internet - Defcon 16 - https://www.youtube.com/watch?v=R_vHhEzxYkY
- DEF CON 22 - Nemus - An Introduction to Back Dooring Operating Systems for Fun and Trolling - https://www.youtube.com/watch?v=g9H-WO_RY3k
- DEFCON 17: Lockpicking Forensics - https://www.youtube.com/watch?v=6kS3kVBotwI
- DEF CON 21 - Panel - Key Decoding and Duplication Attacks for the Schlage Primus Lock - https://www.youtube.com/watch?v=rLMRwB5QUBA
- DEF CON 18 - Samy Kamkar - How I Met Your Girlfriend - https://www.youtube.com/watch?v=fWk_rMQiDGc
- DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor - https://www.youtube.com/watch?v=01oeaBb85Xc
- The Dark Arts: Meet The LulzSec Hackers - https://archive.ph/9OPQg
- The Technology Snob’s Favorite Hacker Group - https://archive.ph/231hR
- A timeline of hacking group LulzSec's attacks - https://archive.ph/b9fjK
- Former Lulzsec hacker Jake Davis on his motivations - https://archive.ph/XGsXF
- 50 days of Lulz: The life and times of LulzSec - https://archive.ph/qXV8w
- Hackers attack another Sony network - https://archive.ph/ro80v
- Inside LulzSec: Chatroom logs shine a light on the secretive hackers - https://archive.ph/rDyVT
- Anonymous leaks FBI phone call discussing hacking investigations - https://archive.ph/uN5DQ
- LulzSec Hackers Tied To Anonymous In Leaked Logs - https://archive.ph/VJQD6
- Operation Anti-Security: LulzSec and Anonymous target banks and governments - https://archive.ph/BcxvD
- Sony Pictures hacked and Database Leaked by LulzSec - https://archive.ph/ZJlBA
- Hacker group LulzSec says it's done - https://archive.ph/lwQR8
- I am Avunit. Ask Me Anything.I am Avunit. Ask Me Anything. - https://archive.ph/dLViw
- Who is the mystery sixth member of LulzSec? - https://archive.ph/KZhsm
- FBI Says LulzSec Hacker Kingpin Was an Informant - https://archive.ph/GtR1r
- Chats, Car Crushes and Cut ‘N Paste Sowed Seeds Of LulzSec’s Demise - https://archive.ph/Owt9f
- Autistic Hacker Helped FBI Nail Anonymous Boss - https://archive.ph/CipE6
- TeaMp0isoN declare war on LulzSec hactivists - https://archive.ph/2jFVd
- Analyzing the Lulzsec Attacks - https://archive.ph/HImE2
- Leaked LulzSec Chat Logs Put Personalities to Hacking Group - https://archive.ph/8NNtY
- Leaked arrest warrants suggest Sabu wasn’t the only FBI mole in Lulzsec - https://archive.ph/OXsNH
- Spain arrests suspected hacker of US and Spanish military agencies - https://archive.ph/Y4Y1d
- Lulzsec hacker group handed jail sentences - https://archive.ph/tV1rJ
- Australia police arrest hacker group LulzSec 'leader' - https://archive.ph/wEdw4
- Introduction to x64 Buffer overflow - https://archive.ph/RiMm7
- Introduction to Binary Exploitation- Exploiting buffer overflows - https://archive.ph/9WcLY
- De Bruijn Sequences - https://archive.ph/aK5zK
- Buffer Overflow - https://archive.ph/kfvbz
- Exploiting Buffer Overflow Vulnerabilities: A Step-by-Step Guide (Part 2) - https://archive.ph/Qticx
- Overflow Vulnerabilities - https://archive.ph/BHML6
- Street Gangs, Tax Fraud and ‘Drop Hoes’ - https://archive.ph/7TCiJ
- Kiteshield Packer is Being Abused by Linux Cyber Threat Actors - https://archive.ph/FjHPC
- Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices - https://archive.ph/Ho3cZ
- Modern Approach to Attributing Hacktivist Groups - https://archive.ph/wv5pS
- JSPSpy and ‘filebroser’: A Custom File Management Tool in Webshell Infrastructure - https://archive.ph/3vEg5
- 8 Million Requests Later, We Made The SolarWinds Supply Chain Attack Look Amateur - https://archive.ph/pZoWe
- One Step Ahead in Cyber Hide-and-Seek: Automating Malicious Infrastructure Discovery With Graph Neural Networks - https://archive.ph/UJOkr
- Malone Iam and His Accomplices Arrested in $243M Crypto Hack - https://archive.ph/6mItE
- What I’ve learned in my first 7-ish years in cybersecurity - https://archive.ph/6BIxJ
- Supply Chain Lessons from Thousands of Exploding Pagers - https://archive.ph/A600i
- Snowblind: The Invisible Hand of Secret Blizzard - https://archive.ph/GRTIq
- One Sock Fits All: The use and abuse of the NSOCKS botnet - https://archive.ph/zD755
- Writing a BugSleep C2 server and detecting its traffic with Snort - https://archive.ph/xr2ht
- Social Media Malvertising Campaign Promotes Fake AI Editor Website for Credential Theft - https://archive.ph/WzkhB
- RUBYCARP: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group - https://archive.ph/dZp5m
- Turning Jenkins Into a Cryptomining Machine From an Attacker's Perspective - https://archive.ph/dEkhQ
- Unpacking the Blackjack Group's Fuxnet Malware - https://archive.ph/mIOhL
- Play Ransomware Group’s New Linux Variant Targets ESXi, Shows Ties With Prolific Puma - https://archive.ph/cdfr0
- A Dive into Earth Baku’s Latest Campaign - https://archive.ph/r2GBL
- Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem - https://archive.ph/TiRrT
- Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion - https://archive.ph/kAi0E
- Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions - https://archive.ph/XHct7
- Using gRPC and HTTP/2 for Cryptominer Deployment: An Unconventional Approach - https://archive.ph/V9SSI
- Attackers Target Exposed Docker Remote API Servers With perfctl Malware - https://archive.ph/K7OC4
- Fake LockBit, Real Damage: Ransomware Samples Abuse Amazon S3 to Steal Data - https://archive.ph/0LJNt
- Malicious JavaScript Injection Campaign Infects 51k Websites - https://archive.ph/dELaK
- Vice Society: A Tale of Victim Data Exfiltration via PowerShell, aka Stealing off the Land - https://archive.ph/T6FSh
- CryptoClippy Speaks Portuguese - https://archive.ph/QUl91
- Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla) - https://archive.ph/PNXph
- Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale - https://archive.ph/yCnNu
- Detecting Popular Cobalt Strike Malleable C2 Profile Techniques - https://archive.ph/miiD6
- Six Malicious Python Packages in the PyPI Targeting Windows Users - https://archive.ph/wip/2Cdey
- P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm - https://archive.ph/dymhm
- Ransomware Delivery URLs: Top Campaigns and Trends - https://archive.ph/YBOsv
- NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts - https://archive.ph/VMyuM
- CL0P Seeds ^_- Gotta Catch Em All! - https://archive.ph/PiFNI
- Blocking Dedicated Attacking Hosts Is Not Enough: In-Depth Analysis of a Worldwide Linux XorDDoS Campaign - https://archive.ph/HKme3
- Understanding DNS Tunneling Traffic in the Wild - https://archive.ph/pRxT8
- CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys - https://archive.ph/vbrKA
- In-Depth Analysis of July 2023 Exploit Chain Featuring CVE-2023-36884 and CVE-2023-36584 - https://archive.ph/lAwFS
- Chinese APT Targeting Cambodian Government - https://archive.ph/nQ0Sy
- Toward Ending the Domain Wars: Early Detection of Malicious Stockpiled Domains- https://archive.ph/tnu3T
- Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors - https://archive.ph/0Q2lk
- ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign - https://archive.ph/4aUxL
- Tackling Anti-Analysis Techniques of GuLoader and RedLine Stealer - https://archive.ph/CQA1N
- Why Is an Australian Footballer Collecting My Passwords? The Various Ways Malicious JavaScript Can Steal Your Secrets - https://archive.ph/tGd8f
- Inside the Rabbit Hole: BunnyLoader 3.0 Unveiled - https://archive.ph/qYtEG
- Intruders in the Library: Exploring DLL Hijacking - https://archive.ph/OStQt
- Diving Into Glupteba's UEFI Bootkit - https://archive.ph/0acO7
- The Art of Domain Deception: Bifrost's New Tactic to Deceive Users - https://archive.ph/6bU0H
- Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor - https://archive.ph/RfZZj
- Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target governmental Entities in the Middle East, Africa and Asia - https://archive.ph/esX86
- Large-Scale StrelaStealer Campaign in Early 2024 - https://archive.ph/E2MVl
- Threat Assessment: Repellent Scorpius, Distributors of Cicada3301 Ransomware - https://archive.ph/Wd6UC
- Autoencoder Is All You Need: Profiling and Detecting Malicious DNS Traffic - https://archive.ph/uLbyW
- Phishing Pages Delivered Through Refresh HTTP Response Header - https://archive.ph/S97g0
- Investigating Infrastructure and Tactics of Phishing-as-a-Service Platform Sniper Dz - https://archive.ph/542lW
- TA Phone Home: EDR Evasion Testing Reveals Extortion Actor's Toolkit - https://archive.ph/dfEPf
- FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications - https://archive.ph/KuyvJ
- Fighting Ursa Luring Targets With Car for Sale - https://archive.ph/pECms
- From RA Group to RA World: Evolution of a Ransomware Group - https://archive.ph/SpISo
- Mass-spreading campaign targeting Zimbra users - https://archive.ph/FCFBa
- The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access - https://archive.ph/Xl0s6
- Linux malware strengthens links between Lazarus and the 3CX supply-chain attack - https://archive.ph/AWEcU
- Asylum Ambuscade: crimeware or cyberespionage? - https://archive.ph/IKxC5
- What’s up with Emotet? - https://archive.ph/mdSuf
- MoustachedBouncer: Espionage against foreign diplomats in Belarus - https://archive.ph/EU9kf
- Telekopye: Hunting Mammoths using Telegram bot - https://archive.ph/sobAi
- OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes - https://archive.ph/cLEBj
- Stealth Falcon preying over Middle Eastern skies with Deadglyph - https://archive.ph/cLEBj
- Operation King TUT: The universe of threats in LATAM - https://archive.ph/nlZoY
- Unlucky Kamran: Android malware spying on Urdu-speaking residents of Gilgit-Baltistann - https://archive.ph/YUX3P
- Telekopye: Chamber of Neanderthals’ secrets - https://archive.ph/9asu0 Initial access broker repurposing techniques in targeted attacks against Ukraine - https://archive.ph/ungoq
- HotPage: Story of a signed, vulnerable, ad-injecting driver - https://archive.ph/v7c9m
- The Dangers of Broken Links: How They Can Threaten Your Cybersecurity - https://archive.ph/YX1L4
- Insecurity through Censorship: Vulnerabilities Caused by The Great Firewall - https://archive.ph/h5dCN
- ESET takes part in global operation to disrupt the Grandoreiro banking trojan - https://archive.ph/difAB
- OilRig’s persistent attacks using cloud service-powered downloaders - https://archive.ph/UiLFZ
- NSPX30: A sophisticated AitM-enabled implant evolving since 2005 - https://archive.ph/6DV82
- Cutting Edge, Part 2: Investigating Ivanti Connect Secure VPN Zero-Day Exploitation - https://archive.ph/tuaHr
- Mid-year Doppelgänger information operations in Europe and the US - https://archive.ph/xvZoJ
- The new era of hacktivism: state-organized hacktivism spreads with Russian-Ukrainian tensions - https://archive.ph/GbL1J
- From fun to data loss: the dark side of Facebook quizzes - https://archive.ph/PJYoH
- Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats https://archive.ph/li3fp
- Russian Military Cyber Actors Target U.S. and
- Global Critical Infrastructure - https://archive.ph/d5fIK
- North Korean hacker BlueNoroff targets crypto firms with new malware - https://archive.ph/OhDoy
- As Hacker Gives Stolen Data Away, Nokia Issues New Denial Statement - https://archive.ph/Sh2aB
- New Password Hack Attack—LastPass, Chrome, Facebook, Netflix, PayPal Users At Risk - https://archive.ph/luLCT
- Chinese Group Accused of Hacking Singtel in Telecom Attacks https://finance.yahoo.com/news/chinese-group-accused-hacking-singtel-041722621.html?guccounter=2
- CosmicBeetle steps up: Probation period at RansomHub - https://archive.ph/AVPOY
- Hackers Are Using Police Emails to Send Tech Companies Fraudulent Data Requests - https://archive.ph/MQWUd
- 'SteelFox' Malware Blitz Infects 11K Victims With Bundle of Pain - https://archive.ph/Z1wzA
- Custom "Pygmy Goat" malware used in Sophos Firewall hack on govt network - https://archive.ph/sXpnU
- Lateral Movement on macOS: Unique and Popular Techniques and In-the-Wild Examples - https://archive.ph/LgVEU
- To the Moon and back(doors): Lunar landing in diplomatic missions - https://archive.ph/XI6cD
- Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain - https://archive.ph/JMztq
- Operation Texonto: Information operation targeting Ukrainian speakers in the context of the war - https://archive.ph/HdchT
- Rescoms rides waves of AceCryptor spam - https://archive.ph/h3Opq
- eXotic Visit campaign: Tracing the footprints of Virtual Invaders - https://archive.ph/BjiIy
- Arid Viper poisons Android apps with AridSpy - https://archive.ph/NXxo0
- Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android - https://archive.ph/Zpslg
- NGate Android malware relays NFC traffic to steal cash - https://archive.ph/mAeM6
- Analysis of two arbitrary code execution vulnerabilities affecting WPS Office - https://archive.ph/KK1ri
- Hundreds of code libraries posted to NPM try to install malware on dev machines - https://archive.ph/dI4jv
- IcePeony and Transparent Tribe Target Indian Entities with Cloud-Based Tools - https://archive.ph/iBp2f
- Malvertising Campaign Hijacks Facebook Accounts to Spread SYS01stealer Malware - https://archive.ph/T9erd
- North Korean Hackers Use Fake News to Spread ‘Hidden Risk’ Malware - https://archive.ph/IlsL8
- Malware campaign expands its use of fake CAPTCHAs - https://archive.ph/vFhm5
- The Evolution of Transparent Tribe’s New Malware - https://archive.ph/vFhm5
- The Muddy Waters of APT Attacks - https://archive.ph/d2KvP
- Muddying the Water: Targeted Attacks in the Middle East - https://archive.ph/qdD6O
- Threat Actors Muddy Waters in Middle East with APT Hijacks and Fake Leaks in Q2 2019 - https://archive.ph/0K6X4
- I know what you did last summer, MuddyWater blending in the crowd - https://archive.ph/NMcuF
- Wading Through Muddy Waters | Recent Activity of an Iranian State-Sponsored Threat Actor - https://archive.ph/FJHye
- Catching fish in muddy waters - https://archive.ph/gFvzv
- New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns - https://archive.ph/5R8Pd
- ToddyCat is making holes in your infrastructure - https://archive.ph/7m2q9
- DuneQuixote campaign targets Middle Eastern entities with “CR4T” malware - https://archive.ph/7m2q9
- Women In Russian-Speaking Cybercrime: Mythical Creatures or Significant Members of Underground? - https://archive.ph/boRbk
- A cascade of compromise: unveiling Lazarus’ new campaign - https://archive.ph/lPuj9
- StripedFly: Perennially flying under the radar - https://archive.ph/PFDWR
- Beyond the Surface: the evolution and expansion of the SideWinder APT group - https://archive.ph/2v9ZG
- HrServ – Previously unknown web shell used in APT attack - https://archive.ph/nviEs
- The Crypto Game of Lazarus APT: Investors vs. Zero-days - https://archive.ph/xgdeP
- Awaken Likho is awake: new techniques of an APT group - https://archive.ph/xIBya
- Finding a needle in a haystack: Machine learning at the forefront of threat hunting research - https://archive.ph/NDm9b
- Tropic Trooper spies on government entities in the Middle East - https://archive.ph/JRY86
- A deep dive into the most interesting incident response cases of last year - https://archive.ph/qUdzT
- BlindEagle flying high in Latin America - https://archive.ph/smuw5
- CloudSorcerer – A new APT targeting Russian government entities - https://archive.ph/7naP9
- ToddyCat: Keep calm and check logs - https://archive.ph/FKLYx
- Operation Triangulation: iOS devices targeted with previously unknown malware - https://archive.ph/ZPPKr
- Meet the GoldenJackal APT group. Don’t expect any howls - https://archive.ph/9E2Sf
- CloudWizard APT: the bad magic story goes on - https://archive.ph/eTJq9
- Tomiris called, they want their Turla malware back - https://archive.ph/mZR7q
- Following the Lazarus group by tracking DeathNote campaign - https://archive.ph/Tm3KR
- Not just an infostealer: Gopuram backdoor deployed through 3CX supply chain attack - https://archive.ph/6zaS1
- Bad magic: new APT found in the area of Russo-Ukrainian conflict - https://archive.ph/ZoAmT
- Roaming Mantis implements new DNS changer in its malicious mobile app in 2022 - https://archive.ph/3x4cG
- BlueNoroff introduces new methods bypassing MoTW - https://archive.ph/7PS53
- Ransomware and wiper signed with stolen certificate - https://archive.ph/N1SRN
- DeathStalker targets legal entities with new Janicab variant - https://archive.ph/0e5VL
- APT10: Tracking down LODEINFO 2022, part II - https://archive.ph/PSZIs
- APT10: Tracking down LODEINFO 2022, part I - https://archive.ph/NNFG4
- DiceyF deploys GamePlayerFramework in online casino development studio - https://archive.ph/u6dDt
- Fortune 1000 at risk: How we discovered 30k exposed APIs & 100k API vulnerabilities in the world’s largest organizations - https://archive.ph/lLWl4
- DeftTorero: tactics, techniques and procedures of intrusions revealed - https://archive.ph/dDrN3
- Kimsuky’s GoldDragon cluster and its C2 operations - https://archive.ph/PMDfO
- VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges - https://archive.ph/eOACn
- Andariel deploys DTrack and Maui ransomware - https://archive.ph/QhBaY
- Targeted attack on industrial enterprises and public institutions - https://archive.ph/lFFBl
- CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit - https://archive.ph/2JIvi
- The SessionManager IIS backdoor - https://archive.ph/UCMzD
- WinDealer dealing on the side - https://archive.ph/Zez7q
- EastWind campaign: new CloudSorcerer attacks on government organizations in Russia - https://archive.ph/pbBpa
- Lazarus Trojanized DeFi app for delivering malware - https://archive.ph/62BNZ
- MoonBounce: the dark side of UEFI firmware - https://archive.ph/jE152
- The BlueNoroff cryptocurrency hunt is still on - https://archive.ph/iqYvT
- ScarCruft surveilling North Korean defectors and human rights activists - https://archive.ph/X7Kk6
- WIRTE’s campaign in the Middle East ‘living off the land’ since at least 2019 - https://archive.ph/DD8hf
- Unearthing APT44: Russia’s Notorious Cyber Sabotage Unit Sandworm - https://archive.ph/Zl6QY
- Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology - https://archive.ph/Ri4w2
- A Decade of Sandworm: Digging into APT44’s Past and Future - https://archive.ph/XUYgi
- New North Korean Campaigns Target Cryptocurrency Industry - https://archive.ph/oGeTe
- Magic Hound Campaign Attacks Saudi Targets - https://archive.ph/xiuz2
- Meow, Meow Leaks, and the Chaos of Ransomware Attribution - https://archive.ph/SqGpa
- Conti Ransomware: Inside One of the World’s Most Aggressive Ransomware Groups - https://archive.ph/uIqKt
- Conti Ransomware Gang Has Full Log4Shell Attack Chain - https://archive.ph/xvVe6
- Disgruntled Affiliate Reveals Conti Ransomware Attack Techniques - https://archive.ph/XAswr
- GhostEmperor: From ProxyLogon to kernel mode - https://archive.ph/gpM3F
- DarkHalo after SolarWinds: the Tomiris connection - https://archive.ph/4IZ3v
- LuminousMoth APT: Sweeping attacks for the chosen few - https://archive.ph/9Vkee
- WildPressure targets the macOS platform - https://archive.ph/vr2o5
- Ferocious Kitten: 6 years of covert surveillance in Iran - https://archive.ph/q3g5e
- Andariel evolves to target South Korea with ransomware - https://archive.ph/RJqef
- PuzzleMaker attacks with Chrome zero-day exploit chain - https://archive.ph/ItNcF
- Operation TunnelSnake - https://archive.ph/4nYU5
- The leap of a Cycldek-related threat actor - https://archive.ph/A39by
- APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign - https://archive.ph/GedUy
- Lazarus targets defense industry with ThreatNeedle - https://archive.ph/ZYyg8
- Sunburst backdoor – code overlaps with Kazuar - https://archive.ph/jDKO1
- Lazarus covets COVID-19-related intelligence - https://archive.ph/jRLOZ
- Sunburst: connecting the dots in the DNS requests - https://archive.ph/IHPwu
- What did DeathStalker hide between two ferns? - https://archive.ph/No4Eg
- IAmTheKing and the SlothfulMedia malware family - https://archive.ph/uZ8U5
- MontysThree: Industrial espionage with steganography and a Russian accent on both sides - https://archive.ph/jhF14
- MosaicRegressor: Lurking in the Shadows of UEFI - https://archive.ph/er2xC
- Transparent Tribe: Evolution analysis, part 2 - https://archive.ph/2Xcur
- Lifting the veil on DeathStalker, a mercenary triumvirate - https://archive.ph/BPNER
- Transparent Tribe: Evolution analysis, part 1 - https://archive.ph/X0EuG
- Lazarus on the hunt for big game - https://archive.ph/zysTE
- MATA: Multi-platform targeted malware framework - https://archive.ph/rdgVJ
- Microcin is here - https://archive.ph/NfgHc
- Cycldek: Bridging the (air) gap - https://archive.ph/L0VIP
- The zero-day exploits of Operation WizardOpium - https://archive.ph/g3gGL
- COMpfun authors spoof visa application with HTTP status-based Trojan - https://archive.ph/pdzxq
- Naikon’s Aria - https://archive.ph/bNiYv
- Hiding in plain sight: PhantomLance walks into a market - https://archive.ph/6ET1E
- Holy water: ongoing targeted water-holing attack in Asia - https://archive.ph/kBdy9
- iOS exploit chain deploys LightSpy feature-rich malware - https://archive.ph/tfQE5
- WildPressure targets industrial-related entities in the Middle East - https://archive.ph/w3AHo
- Operation AppleJeus Sequel - https://archive.ph/tj1IP
- OilRig’s Poison Frog – old samples, same trick - https://archive.ph/OcUrH
- RevengeHotels: cybercrime targeting hotel front desks worldwide - https://archive.ph/nXC6a
- Titanium: the Platinum group strikes again - https://archive.ph/XJllz
- DarkUniverse – the mysterious APT framework #27 - https://archive.ph/dywEs
- COMpfun successor Reductor infects files on the fly to compromise TLS traffic - https://archive.ph/anLhw
- Turla renews its arsenal with Topinambour - https://archive.ph/LaGch
- ‘Twas the night before - https://archive.ph/b25nE
- ViceLeaker Operation: mobile espionage targeting Middle East - https://archive.ph/CvQ69
- Hello again, FakeBat: popular loader returns after months-long hiatus - https://archive.ph/uefkT
- Gleaming Pisces Poisoned Python Packages Campaign Delivers PondRAT Linux and MacOS Backdoors - https://archive.ph/6zZ7y
- Threat Actor Distributes Python-Based Information Stealer Using a Fake Falcon Sensor Update Lure - https://archive.ph/j9Nk3
- Lumma Stealer on the Rise: How Telegram Channels Are Fueling Malware Proliferation - https://archive.ph/Khjlr
- Massive MOVEit Vulnerability Breach: Hacker Leaks Employee Data from Amazon, McDonald’s, HSBC, HP, and Potentially 1000+ Other Companies - https://archive.ph/afcEh
- Schneider Electric Hacked and Blackmailed Following Lumma Infostealer Infection - https://archive.ph/Cm7hg
- The Google 0-day all Infostealer groups are exploiting. - https://archive.ph/WK5MK
- Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations - https://archive.ph/VxNCt
- Life on a crooked RedLine: Analyzing the infamous infostealer’s backend - https://archive.ph/PKHZW
- How AitM phishing kits evade detection - https://archive.ph/NTWuE
- How AitM phishing kits evade detection: Part 2 - https://archive.ph/Ifqzc
- Hamas-affiliated Threat Actor WIRTE Continues its Middle East Operations and Moves to Disruptive Activity - https://archive.ph/rqPLB
- TeamTNT’s Docker Gatling Gun Campaign - https://archive.ph/z7y8I
- Hildegard: New TeamTNT Cryptojacking Malware Targeting Kubernetes - https://archive.ph/5mpnr
- TeamTNT Returns — Or Does It? - https://archive.ph/hbpFv
- Cryptojacking Gang TeamTNT Makes a Comeback - https://archive.ph/EqGY7
- TeamTNT Targets Kubernetes, Nearly 50,000 IPs Compromised in Worm-like Attack - https://archive.ph/Yfgci
- The Real Cost of Cryptomining: Adversarial Analysis of TeamTNT - https://archive.ph/17baI
- Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks - https://archive.ph/uzLxN
- Chaos is a Go-based Swiss army knife of malware - https://archive.ph/6FGsw
- Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134 - https://archive.ph/zxea3
- Necro Python Botnet Goes After Vulnerable VisualTools DVR - https://archive.ph/svH8g
- Python Cryptominer Botnet Quickly Adopts Latest Vulnerabilities - https://archive.ph/r5WrK
- DreamBus Botnet Resurfaces, Targets RocketMQ vulnerability - https://archive.ph/XAinA
- DreamBus Botnet – Technical Analysis - https://archive.ph/KJxHq
- Modus Operandi of Ruthless Mantis - https://archive.ph/qijts
- Malware analysis: Hands-On Shellbot malware - https://archive.ph/sWLzr
- Solving the 7777 Botnet enigma: A cybersecurity quest - https://archive.ph/26NfR
- Gitpaste-12: a new worming botnet with reverse shell capability spreading via GitHub and Pastebin - https://archive.ph/kiGeP
- Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns - https://archive.ph/9oIO8
- Malicious QR Codes: How big of a problem is it, really? - https://archive.ph/PcUei
- A pernicious potpourri of Python packages in PyPI - https://archive.ph/OgJbQ
- Hacking for Babies - https://hackingforbabies.gitbook.io/en/coming-soon
- How to Find More IDORs - https://archive.ph/AJPJf
- Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit - https://archive.ph/5EcY0
- Hacking Subaru: Tracking and Controlling Cars via the STARLINK Admin Panel - https://archive.ph/pFgra
- Linux LKM Persistence - https://archive.ph/cJKJh
- Linux Attack Techniques: Dynamic Linker Hijacking with LD Preload - https://archive.ph/SigLa
- Your Friendly North Korean Network Observer - https://archive.ph/f9qw6
- A Closer Look at North Korea’s Internet - https://archive.ph/hY9V8
- Masscan Cheatsheet - https://archive.ph/HhXYC
- Masscan as a lesson in TCP/IP - https://archive.ph/CNBvY
- Nmap Cheatsheet - https://archive.ph/ve0bn
- Linux Basics for Hackers: The Linux Logging System - https://archive.ph/IPmNu
- Server-Side Request Forgery Prevention Cheat Sheet - https://archive.ph/cOGDy
- Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability - https://archive.ph/GOIuz
- Exploiting Server Side Request Forgery (SSRF) in an API -https://archive.ph/ogch5
- Bug bounty write-up: From SSRF to $4000 - https://archive.ph/PQmVc
- Server-side template injection - https://archive.ph/MZlun
- Finding and Fixing SSTI Vulnerabilities in Flask (Python) With StackHawk - https://archive.ph/voz6d
- SSTI -Bypassing Single Quotes Filter - https://archive.ph/rmpQ4
- Python - Server Side Template Injection (SSTI) - https://archive.ph/FEWWq
- A Pentester’s Guide to Server Side Template Injection (SSTI) - https://archive.ph/fITsI
- SSTI (Server Side Template Injection) - https://archive.ph/UGEmP
- SSTI Bypass Filter (/^[0–9a-z ]+$/i) - https://archive.ph/iwnXl
- File upload vulnerabilities - https://archive.ph/Pslry
- File Upload Cheat Sheet - https://archive.ph/slxVz
- Cross-site scripting - https://archive.ph/rnf2A
- What is Mimikatz? The Beginner's Guide - https://archive.ph/6fsVU
- Wormable XSS www.bing.com - https://archive.ph/mz2QF
- Police Arrested Suspected Hacker Who Hacked the 'Hacking Team - https://archive.ph/RyC9h
- Vigilante Hacker ‘Phineas Fisher’ Denies Working for the Russian Government - https://archive.ph/8Y9gI
- How Hacking Team got hacked - https://archive.ph/zmpCp
- Phineas Fisher Says They Paid $10,000 Bounty to Person Who Hacked Chilean Military - https://archive.ph/8Y9gI
- Hacking Team Hacker Phineas Fisher Has Gotten Away With It - https://archive.ph/tc9SM
- Brazil Arrests ‘USDoD,’ Hacker in FBI Infragard Breach - https://archive.ph/BCZWP
- Hacker USDoD: “I don't pick sides. I play both sides and always win” – interview - https://archive.ph/8hWdx
- Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List - https://archive.ph/sfrJw
- Bling Libra’s Tactical Evolution: The Threat Actor Group Behind ShinyHunters Ransomware - https://archive.ph/8eRMw
- Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake - https://archive.ph/Vhb9j
- Crooks stole AWS credentials from misconfigured sites then kept them in open S3 bucket - https://archive.ph/4DUpm
- ShinyHunters claims Santander breach, selling data for 30M customers - https://archive.ph/ffiid
- Ticketmaster Breach: ShinyHunters Leak 440K Taylor Swift Eras Tour Ticket Data - https://archive.ph/Gg8tX
- Hackers leak alleged Taylor Swift tickets, amp up Ticketmaster extortion - https://archive.ph/fBPhe
- ShinyHunters, Nemesis Linked to Hacks After Leaking Their AWS S3 Bucket - https://archive.ph/hXDqD
- Hacker in Snowflake Extortions May Be a U.S. Soldier - https://archive.ph/UwZRE
- Snowflake hackers identified and charged with stealing 50 billion AT&T records - https://archive.ph/GJD0Q
- Alleged Snowflake hacker detained in Canada at DOJ's request - https://archive.ph/epxro
- US indicts Snowflake hackers who extorted $2.5 million from 3 victims - https://archive.ph/yV9j1
- USDoD Hacker Behind $3 Billion SSN Leak Reveals Himself as Brazilian Citizen - https://archive.ph/uPdeD
- Hackers breach US firm over Wi-Fi from Russia in 'Nearest Neighbor Attack' - https://archive.ph/gBh2a
- Snapshot of North Korea's DNS data taken from zone transfers - https://archive.ph/JziJP
- Simple Windows and Linux keystroke injection tool that exfiltrates stored Wi-Fi data (SSID and password). - https://archive.ph/Of8WK
- Wallet Scam: A Case Study in Crypto Drainer Tactics - https://archive.ph/5bSPh
- How Chainalysis Made Their Way into Popular Monero Wallets - https://archive.ph/6zjNy
- Dirty Tor exit to wallet.dat theft - https://archive.ph/5ERam
- Scientists discover dogs are entering a new phase of evolution - https://archive.ph/ZoS6c
- Jorkle's OSCP Guide - https://archive.ph/Ubz2J
- DEFCON 28 OpenSOC Blue Team CTF: Lessons and Tips - https://archive.ph/vK9UN
- Privilege Escalation - Windows - https://archive.ph/TRup0
- Hacking Chess.com and Accessing 50 Million Customer Records - https://archive.ph/Y7VuW
- Scanners Beware: Welcome to the Network from Hell - https://archive.ph/5kz10
- Messenger Group Call DoS for iOS - https://archive.ph/FWJra
- Hacking Kia: Remotely Controlling Cars With Just a License Plate - https://archive.ph/uj58M
- Dark Web Profile: USDoD - https://archive.ph/0muem
- Leaky John Deere API’s: Serious Food Supply Chain Vulnerabilities Discovered by Sick Codes, Kevin Kenney & Willie Cade. - https://archive.ph/bhMnz
- They Told Their Therapists Everything. Hackers Leaked It All - https://archive.ph/H44KP
- Hacking 700 Million Electronic Arts Accounts - https://archive.ph/FdPGI
- One weird trick to get the whole planet to send abuse complaints to your best friend(s) - https://archive.ph/Eb7TI
- Bug bounty write-up: From SSRF to $4000 - https://archive.ph/PQmVc
- $350 XSS in 15 minutes - https://archive.ph/sVa9o
- BBC Bug Bounty Write-up | XSS Vulnerability - https://archive.ph/EjOvM
- Stop Using Predictable Bucket Names: A Failed Attempt at Hacking Satellites - https://archive.ph/8dGKU
- How I Got My First Reflected XSS Bug Bounty! - https://archive.ph/p9Ld3
- Bug Writeup: Stored XSS to Account Takeover (ATO) via GraphQL API - https://archive.ph/OSUql
- XSS Attack: 3 Real Life Attacks and Code Examples - https://archive.ph/O1odY
- I Studied 100+ SSRF Reports, and Here’s What I Learned - https://archive.ph/vwgUG
- Account Takeover using IDOR in Password reset Functionality - https://archive.ph/wZ8Nm
- Building a Virtual Ethical Hacking Home Lab — Part 2: Lab Topology - https://archive.ph/2AIcw
- Exploring The Impersonator Shell - https://archive.ph/21U4v
- Advance AI Test Cases For Penetration Testing - https://archive.ph/nAqd1
- Go — ing Rogue: The Malware Development Odyssey (Part I) - https://archive.ph/MHLrz
- Go — ing Rogue: The Malware Development Odyssey (Part II) - https://archive.ph/ivAYb
- My First Bug: Blind SSRF Through Profile Picture Upload - https://archive.ph/UdruZ
- SSRF to Server Takeover PoC (Bug Bounty Writeup) - https://archive.ph/dzfvY
- Learning about Server Side Request Forgery (SSRF) - https://archive.ph/yqtJQ
- Unrestricted File Upload Leads to SSRF and RCE - https://archive.ph/ThHXI
- A Nifty SSRF Bug Bounty Write Up - https://archive.ph/5JaWZ
- SSRF Internal resource accessing & Bypassing Filter (CTF) - https://archive.ph/L7yGu
- Server-Side Request Forgery (SSRF) - https://archive.ph/R4NGi
- Houzz – SSRF Vulnerability Bugbounty Writeup - https://archive.ph/qNl7x
- United Nations IDOR Vulnerability Writeup - https://archive.ph/8sEM2
- BMW Bug Bounty – Account Verification Bypass writeup - https://archive.ph/ZvUyM
- How I earned $800 for Host Header Injection Vulnerability - https://archive.ph/PwvjP
- Bugbounty Write-up: IDOR (Insecure Direct Object References) - https://archive.ph/I6hYW
- How I Discovered a CVE by Scanning Open Source Repositories - https://archive.ph/BccLn
- It Started with CSRF, But Wait… (XSS & Potential SQLi) - https://archive.ph/U0LYy
- Hijacking your JavaScript using prototype pollution - https://archive.ph/lPfce
- How I Found Multiple XSS Vulnerabilities Using Unknown Techniques - https://archive.ph/pwnYU
- Blue Team Bootcamp Series (P3): How to Detect Cross-Site Scripting (XSS) Attacks - https://archive.ph/ZjTOX
- Crafting XSS (Cross-Site Scripting) payloads - https://archive.ph/UdK9s
- Bug Bounty Writeup: $2500 Reward for Session Hijack via Chained Attack - https://archive.ph/7LX1I
- Triple XSS in a Private Bug Bounty Program via a Hidden Parameter - https://archive.ph/KsNz1
- Hunting for Hidden Parameters in Burp Suite - https://archive.ph/B05y9
- Power of One-Liners: Master Bug Bounty Automation: - https://archive.ph/54Sc6
- How to Use ParamSpider Tool — For Bug Bounty - https://archive.ph/oJr1o
- Params — Discovering Hidden Treasure in WebApps - https://archive.ph/eqGI3
- SONY Hunting I: Discovering Hidden Parameters (5x SWAG)- https://archive.ph/L7c8D
- How I Found Multiple SQL Injections in 5 Minutes in Bug Bounty - https://archive.ph/bEQO2
- Fuzzing Websites to Find Hidden Parameters - https://archive.ph/drgAn
- Hacker tools: Arjun – The parameter discovery tool - https://archive.ph/fTp7F
- How To Find Hidden Parameters - https://archive.ph/DSDnC
- Bug Bounty: Tumblr reCAPTCHA vulnerability write up - https://archive.ph/bPupq
- We Hacked Apple for 3 Months: Here’s What We Found - https://archive.ph/cvaMj
- Monke's Guide to Bug Bounty Methodology - https://archive.ph/KJk0d
- The Art Of Zendesk Hijacking - https://archive.ph/Fauwt
- XSS WAF & Character limitation bypass like a boss - https://archive.ph/Nc3xF
- Unicode vs WAF — XSS WAF Bypass - https://archive.ph/GlDkN
- XSS bypass using META tag in realestate.postnl.nl - https://archive.ph/F2Ugr
- Unveiling Trickest: My Secret Weapon for Automating the Bug Bounty Hunt - https://archive.ph/b9FGb
- 10 Things I Learnt in My First Year as a Penetration Tester - https://archive.ph/86CYc
- HackTheBoo 2022 CTF Write-Ups - https://archive.ph/EWovw
- THM write-up: Hacking with Powershell - https://archive.ph/IOjtW
- CFReDS Project:- Hacking Case Challenge Writeup - https://archive.ph/kKvl1
- Penetration Testing: Methodology, Scope and Types of Pentests - https://archive.ph/ziBpB
- Breaking Down the Hacking Team Attack Operation - https://archive.ph/vgras
- Hacking Millions of Modems (and Investigating Who Hacked My Modem) - https://archive.ph/ikr9N
- Mass Blind Server-Side Testing Setup For Bug Bounty - https://archive.ph/YpxGo
- How I bypassed disable_functions in php to get a remote shell - https://archive.ph/8A2OL
- The Way I Used to Find RCE (Remote Code Execution) via File Upload - https://archive.ph/0k20X
- HOW I GOT MY FIRST RCE WHILE LEARNING PYTHON - https://archive.ph/bvA4e
- Log4shell Zero-Day Exploit— Full Guide - https://archive.ph/vhzKf
- Data exfiltration over DNS with Remote Code Execution - https://archive.ph/vsD42
- Hacking My College Admin Panel For Fun😁 - https://archive.ph/cdLxt
- Master the subdomain hunting Part 2 - https://archive.ph/1CT9O
- Master Subdomain HUNTING | Art of finding Hidden Assets - https://archive.ph/xEGqX
- #1 Bug Hunting: Subdomain Enumeration — Explained - https://archive.ph/BE5c0
- Mastering Reconnaissance with Nmap: Unveiling Your Target’s Secrets - https://archive.ph/QiD01
- Would you mind to tell me what your bank balance is? No? Okay, I’ll hack it. - https://archive.ph/08alD
- My recon methodology for hunting CVE-2021–42063 led to discovering an RXSS vulnerability in the Tata Play program Part -1 . - https://archive.ph/iRpxq
- What is WAF? & Secret Techniques to Bypass It - https://archive.ph/HAyJI
- Bypassing CSP via URL Parser Confusions : XSS on Netlify’s Image CDN - https://archive.ph/uFEHF
- Finding SSRF BY Full Automation - https://archive.ph/jLHEU
- Obfuscating a Mimikatz Downloader to Evade Defender (2024) - https://archive.ph/UEGMN
- I scanned all of ACT Bangalore customers, and the results aren’t surprising - https://archive.ph/nYoAR
- Understanding Different Types of Cybersecurity Scanning - https://archive.ph/jMVxZ
- Hacking & Fuzzing Home Surveillance Camera - https://archive.ph/6N04A
- The Fuzzy Wuzzy: Unveiling Hidden Parameters - https://archive.ph/QfUG7
- Drunk Admin Web Hacking Challenge-1: vulnhub write-up - https://archive.ph/mBRHG
- How I accidentally hacked a local news site - https://archive.ph/xUTyA
- How I Hacked Into a Nationwide University Database System Exposing Thousands of Student Records - https://archive.ph/qe8ne
- SSRF in real life - https://archive.ph/5hoTP
- Attacking APIs with SSRF and how to prevent it - https://archive.ph/LcyQa
- Not-so-SimpleHelp exploits enabling deployment of Sliver backdoor - https://archive.ph/fXbYt
- Server-side request forgery (SSRF) - https://archive.ph/JPph1
- Bypassing Common SSRF Protections: Techniques Attackers Use - https://archive.ph/KgB90
- A Complete Guide To Server-Side Request Forgery (SSRF) - https://archive.ph/xOHaS
- SSRF Bypass Techniques: A Comprehensive Guide for Security Researchers - https://archive.ph/ET8dc
- SSRF 101-Everything you need to know about SSRF attacks - https://archive.ph/C2eQS
- An SSRF, privileged AWS keys and the Capital One breach - https://archive.ph/6ZFQE
- Intro to SSRF - https://archive.ph/6azuk
- How to Detect and Mitigate SSRF Vulnerabilities in the Early Coding Cycle: A Comprehensive Guide - https://archive.ph/EfcQ9
- SSRF attack against other back-end systems, SSRF series (Part 1b) - https://archive.ph/jSjaK
- Unveiling The Techniques Of Finding Server-Side Request Forgery (SSRF) In Web Applications (with a exploitation example) - https://archive.ph/mP2V6
- SSRF (Server Side Request Forgery) worth $4,913 | My Highest Bounty Ever ! - https://archive.ph/RW1PG
- Uncovering SSRF Vulnerabilities Made Simple: Leveraging the Wayback Machine’s Saved Pages - https://archive.ph/OhodJ
- Mastering Server-side Request Forgery (SSRF): Exploitation Techniques and Practical Labs - https://archive.ph/OIA5I
- Vulnerability Vault: Breaking Down SSRF — Server Side Request Forgery (Part 1) - https://archive.ph/0VN9G
- Vulnerability Vault: Breaking Down SSRF — Server Side Request Forgery (Part 2) - https://archive.ph/Jk2Lw
- Routing Based SSRF - https://archive.ph/658gH
- Exploiting Server-Side Request Forgery (SSRF) Through Image Validation Bypass - https://archive.ph/kEJpI
- Beginner Guide To Exploit Server Side Request Forgery (SSRF) Vulnerability - https://archive.ph/GOIuz
- Part 1 — Uncovering the Vulnerability: How Attackers Can Exploit SSRF via PDF Generation (wkhtmltopdf) - https://archive.ph/X0aRP
- Unveiling The Techniques Of Finding Blind & Time based SSRF In Web Applications (with a exploitation example -https://archive.ph/c1BNp
- CVE-2023–33534: Account takeover through CSRF vulnerability - https://archive.ph/JoQ5W
- CSRF- Netflix and Youtube are victims of it - https://archive.ph/lx7DC
- Explanation of CSRF ( Cross-Site Request Forgery ) - https://archive.ph/7RWGe
- Account Takeover [Via Cross Site Request Forgery] - https://archive.ph/sZev6
- Unmasking Basic CSRF Bugs: Hunter Guide for Beginners - https://archive.ph/iw36N
- Chaining CSRF with XSS to deactivate Mass user accounts by single click - https://archive.ph/OXmZW
- AiTM Phishing, Hold the Gabagool: Analyzing the Gabagool Phishing Kit - https://archive.ph/XhPwZ
- Leveling Up Fuzzing: Finding more vulnerabilities with AI - https://archive.ph/DDgjZ
- CVE-2024-4879 and CVE-2024-5217 (ServiceNow RCE) Exploitation in a Global Reconnaissance Campaign - https://archive.ph/7b3GP
- Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR - https://archive.ph/Z3Sa6
- Traders' Dollars in Danger: CVE-2023-38831 zero-Day vulnerability in WinRAR exploited by cybercriminals to target traders - https://archive.ph/Jg2mY
- CVE-2024-38365: Btcd Bug Could Have Led to Bitcoin - https://archive.ph/CYP8d
- CVE-2024–45519 in Zimbra — Bounty $ 1000 - https://archive.ph/n6Uy5
- CVE-2024–25600: WordPress Bricks Builder Remote Code Execution Vulnerability -$$$$ BOUNTY - https://archive.ph/D6jTu
- CVE-2024–0195 Improper Control of Generation of Code (‘Code Injection’) - https://archive.ph/46NEA
- Awesome-anti-forensic - https://archive.ph/geEjb
- Ethical hacking: Log tampering 101 - https://archive.ph/l0WN0
- Post-exploitation tool to cover your tracks on a compromised machine (beta) - https://archive.ph/1JpfK
- Browser Artifacts | HackTricks - https://archive.ph/H3jQc
- How to Cover Your Tracks on a Linux System: An Ethical Hacker’s Guide - https://archive.ph/bIOuH
- Covering tracks - https://archive.ph/ySO8Q
- 25 TCP - Simple Mail Transfer Protocol (SMTP) - https://archive.ph/HjJrI
- Pentest - Everything SMTP - https://archive.ph/8SQGt
- A Beginner’s Guide to DNS Reconnaissance (Part 1) - https://archive.ph/hIavs
- SQL Injection Polyglots - https://archive.ph/oQZbA
- Forest: A walk through in hacking active directory - https://archive.ph/98zPl
- Exploiting Active Directory Certificate Services - ESC11 Walkthrough - https://archive.ph/JBMmt
- Active Directory Penetration Testing - The Fundamentals of Kerberos - https://archive.ph/Z8lcl
- Creating a Home Active Directory Lab - https://archive.ph/gvYnA
- Building an Active Directory Home Lab - https://archive.ph/Am8yy
- Deploy an Active Directory Lab Within Minutes - https://archive.ph/8zqrE
- Building A Basic Active Directory Lab - https://archive.ph/qwc7e
- How to decompile external functions of *.so library in ELF with Ghidra? - https://archive.ph/58a3i
- Using Ghidra to reverse engineer an exe file(crackme0x00.exe) in Kali Linux - https://archive.ph/H0tZI
- How to Use Ghidra to Reverse Engineer Malware - https://archive.ph/sscMs
- Learning Ghidra Basics Analyzing Firmware - https://archive.ph/Gr0Ns
- How to use Ghidra to Reverse Engineer Mobile Application - https://archive.ph/yc09s
- Code Analysis With Ghidra: An Introduction - https://archive.ph/Gn8jp
- Everyday Ghidra: Ghidra Data Types— When to Create Custom GDTs — Part 1 - https://archive.ph/ILAYB
- Everyday Ghidra: Ghidra Data Types — Creating Custom GDTs From Windows Headers — Part 2 - https://archive.ph/raPAr
- Everyday Ghidra: Symbols — Prescription Lenses for Reverse Engineers — Part 1 - https://archive.ph/65FHI
- Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2 - https://archive.ph/VIJYU
- DLL Hijacking & Ghidra - https://archive.ph/YMui6
- A Guide to Reversing Shared Objects with Ghidra - https://archive.ph/krMsa
- Extracting Ghidra Decompiler Output with Python - https://archive.ph/oWaGn
- ListingLover – Add pseudo-code to Ghidra disassembly - https://archive.ph/igyYP
- KatWalk C2: p.5: overclocking and bugfixing or how to use Ghidra to analyse ARM firmware - https://archive.ph/NZCbC
- How To Use Ghidra For Malware Analysis - Identifying, Decoding and Fixing Encrypted Strings - https://archive.ph/rCKBY
- Visualizing Android Code Coverage Pt.1 - https://archive.ph/EepBN
- how to train your Ghidra https://archive.ph/YosPs
- Ghidra 101: Binary Patching - https://archive.ph/NV5fq
- Ghidrathon: Snaking Ghidra with Python 3 Scripting - https://archive.ph/d0CwL
- Reversing C++, Qt based applications using Ghidra - https://archive.ph/5G85O
- Here Be Dragons: Reverse Engineering with Ghidra - Part 1 [Data, Functions & Scripts] - https://archive.ph/uYai7
- Reverse engineering 3D Movie Maker - Part 1 - https://archive.ph/714WJ
- Unstripping Stripped Binaries - https://archive.ph/pBld8
- Reverse Engineering Go Binaries with Ghidra - https://archive.ph/RYIgS
- An Abstract Interpretation-Based Deobfuscation Plugin for Ghidr - https://archive.ph/VjFbI
- Parent PID Spoofing (Stage 2) Ataware Ransomware – Part 0x3 - https://archive.ph/CWBSF
- UAC bypass analysis (Stage 1) Ataware Ransomware – Part 0x2 - https://archive.ph/G0xAU
- Reversing C++ Virtual Functions: Part 1 - https://archive.ph/OmwJg
- Part 2: Reverse Engineering and Patching with Ghidra - https://archive.ph/lE94j
- Secret inside of .so file - https://archive.ph/wDvSV
- Reversing Native Libraries | HackTricks - https://archive.ph/nrhKu
- Intro to Android mobile reverse engineering - https://archive.ph/WyaAY
- http-request-smuggling - https://archive.ph/l5TFr
- Top 10 web hacking techniques of 2024 - https://archive.ph/dRWMH
- WordPress User Enumeration - https://archive.ph/bMhQj
- Script http-drupal-enum-users - https://archive.ph/SAEhF
- Blog about HTTP Request Smuggling, including a demo application. - https://archive.ph/UeLq4
- Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) - https://archive.ph/BJOPQ
- Common Nginx misconfigurations that leave your web server open to attack - https://archive.ph/g04pB
- A simple script just made for self use for bypassing 403 - https://archive.ph/K7LV5
- Unauthenticated SSRF (CVE-2024-41570) on Havoc C2 teamserver via spoofed demon agent - https://archive.ph/ynr5u
- Modify HTML pages on the fly using NGINX - https://archive.ph/8vw3k
- HTTP Security Headers: A complete guide to HTTP headers - https://archive.ph/klIj0
- MegaMedusa, RipperSec’s Public Web DDoS Attack Tool - https://archive.ph/pDj6p
- Attacking APIs using JSON Injection - https://archive.ph/F4AeT
- When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls - https://archive.ph/J6Wx7
- Breaking Down Multipart Parsers: File upload validation bypass - https://blog.sicuranext.com/breaking-down-multipart-parsers-validation-bypass/
- Exploiting Empire C2 Framework - https://aceresponder.com/blog/exploiting-empire-c2-framework
- Vulnerabilities in Open Source C2 Frameworks - https://archive.ph/OFcm3
- How I Hacked 40 Websites in 7 minutes - https://archive.ph/mBRHG
- Gootloader C2 Sails to New Hoster (and new URL) - https://archive.ph/W0usB
- RansomHub Affiliate leverages Python-based backdoor - https://archive.ph/fg7ti
- LockBit Admins Tease a New Ransomware Version - https://archive.ph/Kq3LZ
- Python-Based NodeStealer Version Targets Facebook Ads Manager - https://archive.ph/dkkEp
- Rise of LNK (Shortcut files) Malware - https://archive.ph/FitJ4
- Skuld Infostealer Returns to npm with Fake Windows Utilities and Malicious Solara Development Packages - https://archive.ph/Jqaeo
- Phishing Campaigns featuring Ursnif Trojan on the Rise - https://archive.ph/Ln48C
- HANCITOR DOC drops via CLIPBOARD - https://archive.ph/1tda0
- Malicious PowerPoint Documents on the Rise - https://archive.ph/UBMX8
- Android malware distributed in Mexico uses Covid-19 to steal financial credentials - https://archive.ph/jDFeM
- GULoader Campaigns: A Deep Dive Analysis of a highly evasive Shellcode based loader - https://archive.ph/VM4Rm
- HiddenAds Spread via Android Gaming Apps on Google Play - https://archive.ph/TATqx
- Peeling Back the Layers of RemcosRat Malware - https://archive.ph/TUNau
- Unmasking AsyncRAT New Infection Chain - https://archive.ph/4qP2Q
- Distinctive Campaign Evolution of Pikabot Malware - https://archive.ph/EpWBd
- PDF Phishing: Beyond the Bait - https://archive.ph/8XQZG
- Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices - https://archive.ph/BbNE4
- DarkGate: Dancing the Samba With Alluring Excel Files - https://archive.ph/VBEDR
- Gootloader’s New Hideout Revealed: The Malware Hunt in WordPress’ Shadows - https://archive.ph/a8Mhe
- Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations - https://archive.ph/wip/xloz9
- Python Crypto Library Updated to Steal Private Keys - https://archive.ph/dqEEn
- 6 Common Persistence Mechanisms in Malware - https://archive.ph/GZqAu
- Technical Analysis of DarkVision RAT - https://archive.ph/n6hoH
- Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics - https://archive.ph/Aa0E2
- Unpacking the unpleasant FIN7 gift: PackXOR - https://archive.ph/M2fjZ
- Shining Light on the Dark Angels Ransomware Group - https://archive.ph/n6hoH
- BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar - https://archive.ph/xLiZF
- RAT Malware Operating via Discord Bot - https://archive.ph/VDkUs
- Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms - https://archive.ph/s2CQU
- SmokeBuster: Keeping Systems SmokeLoader Free - https://archive.ph/2cn98
- China-Linked TAG-112 Targets Tibetan Media with Cobalt Strike Espionage Campaign - https://archive.ph/CpQ7C
- APT-K-47 Uses Hajj-Themed Lures to Deliver Advanced Asyncshell Malware - https://archive.ph/HbXi6
- PythonRatLoader: The Proprietor of XWorm and Friends - https://archive.ph/4emmf
- Hamas-linked SameCoin campaign malware analysis - https://archive.ph/7FtzS
- Unmasking Styx Stealer: How a Hacker’s Slip Led to an Intelligence Treasure Trove - https://archive.ph/GpNKs
- July 2020’s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence - https://archive.ph/bpJSu
- Gootloader’s Pivot from SEO Poisoning: PDF Converters Become the New Infection Vector - https://gootloader.wordpress.com/2024/11/07/gootloaders-pivot-from-seo-poisoning-pdf-converters-become-the-new-infection-vector/
- Telegram Bot API based Python backdoor with file download and execution capability - https://archive.ph/IW9vp
- Create your own custom implant - https://archive.ph/4yjFC
- Sign1 Malware: Analysis, Campaign History & Indicators of Compromise - https://archive.ph/GQPHU
- The Prevalence of DarkComet in Dynamic DNS - https://archive.ph/XZCw6
- Analysis of DEV#POPPER: New Attack Campaign Targeting Software Developers Likely Associated With North Korean Threat Actors - https://archive.ph/64x25
- Jumpy Pisces Engages in Play Ransomware - https://archive.ph/0CdFm
- Silent Skimmer Gets Loud (Again) - https://archive.ph/9sTEJ
- Obfuscating Malicious, Macro-Enabled Word Docs - https://archive.ph/iO5hS
- Inside SnipBot: The Latest RomCom Malware Variant - https://archive.ph/mZJkE
- Tricks and Treats: GHOSTPULSE’s new pixel- level deception - https://archive.ph/cqDp5
- PBot: a Python-based adware - https://archive.ph/7FVp1
- Intro to malware analysis: Analyzing Python malware - https://archive.ph/7vF9i
- PyLoose: Python-based fileless malware targets cloud workloads to deliver cryptominer - https://archive.ph/3cyiT
- New Python-Based Crypto-Miner Botnet Flying Under the Radar - https://archive.ph/ITfhx
- Snakes on a Domain: An Analysis of a Python Malware Loader - https://archive.ph/S2TNd
- Python-Based PWOBot Targets European Organizations - https://archive.ph/MLafX
- Akira Stealer : An Undetected Python Based Info-stealer - https://archive.ph/noNrR
- The Dead Russian Poets Society’: Silent Push uses behavioral fingerprinting, content scans and a 128-year old Russian poem to uncover 150+ new ACTIVE Lumma C2 servers and admin panels - https://archive.ph/xsPKd
- You dirty RAT! Part 1: DarkComet - https://archive.ph/XU2Xl
- DarkComet RAT: Technical Analysis of Attack Chain - https://archive.ph/EYTt8
- Malicious Python Package Typosquats Popular 'fabric' SSH Library, Exfiltrates AWS Credentials - https://archive.ph/fQmmB
- WISH STEALER - https://archive.ph/S954A
- AsyncRAT’s Infection Tactics via Open Directories: Technical Analysis - https://archive.ph/iG2Vy
- Finding Malware: Detecting GOOTLOADER with Google Security Operations. - https://archive.ph/ODziW
- BianLian Ransomware Group: 2024 Activity Analysis - https://archive.ph/YA9Sj
- How to Pick Stocks: Fundamentals vs. Technical - https://archive.ph/gq2b8
- Top Wall Street analysts pick these 3 dividend stocks for higher returns - https://archive.ph/ebsT1
- I used AI to analyze every US stock. Here’s how to use this to make data-driven investing decisions - https://archive.ph/pW2b7
- Machine Learning to identify malicious strings in a file - https://archive.ph/BJthZ
- Conducting Robust Learning for Empire Command and Control Detection - https://archive.ph/9UMvG
- Harnessing LLMs for Automating BOLA Detection - https://archive.ph/wQvAk
- Detecting Vulnerability Scanning Traffic From Underground Tools Using Machine Learning - https://archive.ph/h1hOE
- Deceptive Delight: Jailbreak LLMs Through Camouflage and Distraction - https://archive.ph/1TIuE
- Simulate the activity of a brute-force attack - https://archive.ph/1kHDy
- Using Decision Tree Analysis for Intrusion Detection: A How-To Guide - https://www.giac.org/paper/gcia/6498/decision-tree-analysis-intrusion-detection-how-to-guide/123230
- An intelligent system that takes a document and classifies different writing styles within the document using stylometric techniques. - https://archive.ph/8NUzP
- Stylometry library for Burrows' Delta method - https://archive.ph/Y7epe
- Decision Tree Machine Learning - https://archive.ph/Bq71H
- AI-Powered Rhadamanthys Stealer Targets Crypto Wallets with Image Recognition - https://archive.ph/m6rFb
- Tracing Ransomware Threat Actors Through Stylometric Analysis and Chat Log Examination - https://archive.ph/J9F96
- Which Doors Are Open: Reinforcement Learning-based Internet-wide Port Scanning - https://archive.ph/5thbR
- Can We Train a Neural Network to Read Stock Market Charts? - https://archive.ph/Gi7PL
- Ruby ERB Template Injectionm- https://archive.ph/dNrqn
- Attacking Ruby on Rails Applications - https://archive.ph/lrG5Y
- Class, Object and Module Hierarchy - https://archive.ph/64u08
- Class Pollution in Ruby: A Deep Dive into Exploiting Recursive Merges - https://archive.ph/YqtRe
- Rack for Ruby: Socket Hijacking - https://archive.ph/r1Jjj
- Sessions in Sinatra - https://archive.ph/FM3sn
- Best Practices - https://archive.ph/nTyZR
- an example ruby erb app vulnerable to ssti - https://archive.ph/3MDZ0
- Blocks, Procs, and & operator in Ruby - https://archive.ph/ikPqx
- Introducing Ruzzy, a coverage-guided Ruby fuzzer - https://archive.ph/ayAac
- A random testing / fuzzer framework for Ruby. - https://archive.ph/d9RhB
- Introducing Afl-Ruby: fuzz your Ruby programs using afl - https://archive.ph/W6xFo
- A coverage-guided fuzzer for pure Ruby code and Ruby C extensions - https://archive.ph/Rdi2l
- Awesome AWS S3 Security - https://archive.ph/AIecx
- Awesome Android Reverse Engineering - https://archive.ph/nOieD
- A curated list of free courses & certifications. - https://archive.ph/vYTKF
- A curated list of amazingly awesome open-source sysadmin resources. - https://archive.ph/Y8TPg
- A curated list of awesome Deep Learning tutorials, projects and communities. - https://archive.ph/K5BNd
- A collection of awesome penetration testing resources, tools and other shiny things - https://archive.ph/sl7HP
- 🐬 A collection of awesome resources for the Flipper Zero device. - https://archive.ph/6UsJE
- A curated list of awesome open source libraries to deploy, monitor, version and scale your machine learning
- 📖 A curated list of resources dedicated to Natural Language Processing (NLP) - https://archive.ph/F5kbU
- machine learning and deep learning tutorials, articles and other resources - https://archive.ph/wCPq8
- 📝 A curated list of awesome Raspberry Pi tools, projects, images and resources - https://archive.ph/wWjgi
- 💎 A collection of awesome Ruby libraries, tools, frameworks and software - https://archive.ph/FtbPS
- A curated list of awesome Hacking tutorials, tools and resources - https://archive.ph/XjPF9
- Awesome Malware Analysis - https://archive.ph/fTlv9
A collection of APIs - https://archive.ph/8Qjtm- 🐶 A curated list of Web Security materials and resources. - https://archive.ph/8Qjtm
- A list of AI autonomous agents - https://archive.ph/VPGQ6
Over 100 Malicious Packages Target Popular ML PyPi Libraries - https://archive.ph/Mbvka
- Introduction to stylometry with Python - https://archive.ph/xnGYe
- Attacker Hidden in Plain Sight for Nearly Six Months, Targeting Python Developers - https://archive.ph/ICjp6
- Unpacking Python Executables on Windows and Linux- https://archive.ph/d47Ra
- Decompile compiled python binaries (exe, elf) - Retreive from .pyc - https://archive.ph/ukvah
- Demystifying PyInstaller | A Journey into Decompiling Python Executables - https://archive.ph/JBk8v
- Pyinstaller Reverse Engineering - https://archive.ph/X6H9j
- pydumpck 1.20.1 - https://archive.ph/GnsXw
- Over 100 Malicious Packages Target Popular ML PyPi Libraries - https://archive.ph/Mbvka
- Introduction to stylometry with Python - https://archive.ph/xnGYe
- Attacker Hidden in Plain Sight for Nearly Six Months, Targeting Python Developers - https://archive.ph/ICjp6
- Unpacking Python Executables on Windows and Linux - https://archive.ph/d47Ra
- Decompile compiled python binaries (exe, elf) - Retreive from .pyc - https://archive.ph/ukvah
- Demystifying PyInstaller | A Journey into Decompiling Python Executables - https://archive.ph/JBk8v
- Pyinstaller Reverse Engineering - https://archive.ph/X6H9j
- pydumpck 1.20.1 - https://archive.ph/GnsXw
- Defending Against SCATTERED SPIDER and The Com with Cybercrime Intelligence https://www.sans.org/blog/defending-against-scattered-spider-and-the-com-with-cybercrime-intelligence/
- Alleged Scattered Spider SIM-swapper must pay back $13.2M to 59 victims - https://archive.ph/Sa7J6
- Another teenage hacker charged as feds continue Scattered Spider crackdown - https://archive.ph/kRjS9
- Threat Group Assessment: Muddled Libra - https://archive.ph/3UKvX
- Scattered Spider x RansomHub: A New Partnership - https://archive.ph/AQH0a
- Scattered Spider laying new eggs - https://archive.ph/r1kte
- A Closer Look at the LAPSUS$ Data Extortion Group - https://archive.ph/7I9V0
- Meet Lapsus$: An Unusual Group in the Cyber Extortion Business - https://archive.ph/wip/hITkZ
- A New Threat Actor Group Emerges: Understanding Lapsus$ - https://archive.ph/wip/w35q2
- Who Is the LAPSUS$ Group? - https://archive.ph/wip/YMJRM
- Unveiling the Tactics of Lapsus$: A Review of Internal Attacks Vectors, Mobile Device Exploitation, and Social Engineering Techniques - https://archive.ph/vocOx
- Threat Brief: Lapsus$ Group - https://archive.ph/JP8vj
- Brazen, Unsophisticated and Illogical: Understanding the LAPSUS$ Extortion Group - https://archive.ph/RAO7s
- Scattered Spider Escalates Attacks on Financial Services Cloud Environments - https://archive.ph/gMi2L
- Scattered Spider, Oktapus, UNC3944, Scatter Swine – MGM Resorts Compromise - https://archive.ph/MFBwh
- Ransomware in the Cloud: Scattered Spider Targeting Insurance and Financial Industries - https://archive.ph/L9T8s
- SCATTERED SPIDER Exploits Windows Security Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass Endpoint Security - https://archive.ph/qBs0Z
- LAPSUS$ aka Scattered Spider: Threat Card and Dossiers - https://archive.ph/4xkvH
- The Original APT: Advanced Persistent Teenagers - https://archive.ph/ANdaB
- How Discord is Abused for Cybercrime - https://archive.ph/WA0U3
- Scattered Spider is a Young Ransomware Gang Exploiting Large Corporations - https://archive.ph/fHSyY
- Why Are You Texting Me? UNC3944 Leverages SMS Phishing Campaigns for SIM Swapping, Ransomware, Extortion, and Notoriety - https://archive.ph/8Qsl6
- Unmasking Phishing: Strategies for identifying 0ktapus domains and beyond - https://archive.ph/MzFcN
- 5 Scattered Spider Gang Members Indicted in Multi-Million Dollar Cybercrime Scheme - https://archive.ph/bjvio
- Lapsus$ Gang Part 2: Script Kiddies Get Massive Companies - https://archive.ph/phmqj
- Teenagers Leveraging Insider Threats: Lapsus$ Hacker Group - https://archive.ph/pIzii
- The Lapsus$ Hacking Group Is Off to a Chaotic Start - https://archive.ph/J15nD
- DEV-0537 criminal actor targeting organizations for data exfiltration and destruction - https://archive.ph/Q8WxA
- LAPSUS$: How a Sloppy Extortion Gang Became One of the Most Prolific Hacking Groups - https://archive.ph/yBMAm
- LAPSUS$ Data Breach Against Several High-Profile Victims - https://archive.ph/kht1U
- Lapsus$: The script kiddies are alright - https://archive.ph/lLlUA
- Lapsus$ hacker who targeted Uber and Grand Theft Auto maker indefinitely detained - https://archive.ph/YpoDk
- 'This Is Really, Really Bad': Lapsus$ Gang Claims Okta Hack - https://archive.ph/YZGLm
- British LAPSUS$ Teen Members Sentenced for High-Profile Attacks - https://archive.ph/FpFQ2
- T-Mobile Admits Lapsus$ Hackers Gained Access to its Internal Tools and Source Code - https://archive.ph/j8k4G
- Scattered Spider: The Modus Operandi - https://archive.ph/cxn1R
- Scattered Spider laying new eggs - https://archive.ph/r1kte
- Scattered Spider - https://archive.ph/MD6v7
- Understanding the Cyber Threat Powerhouse Muddled Libra - https://archive.ph//DCOQN
- Dissecting Scattered Spider with Maltego - https://archive.ph/D2gfG
- Scattered Spider Attack Analysis - https://archive.ph/Li7Rr