SecTemple: hacking, threat hunting, pentesting y Ciberseguridad
▼
Showing posts with label Yara Rules. Show all posts
Showing posts with label Yara Rules. Show all posts

Anatomía de un Threat Hunt Avanzado: Desvelando Amenazas con VirusTotal

›
La red moderna es un campo de batalla digital, un telón lleno de ecos de batallas perdidas y victorias efímeras. Los sistemas heredados, c...

AASLR: Unveiling the Art of Obfuscating Malware Strings and Imports for Elite Defenders

›
The digital shadows are vast, and within them, malware whispers its intentions through strings and imports. For years, the blue team opera...

Modern Threat Hunting: A Deep Dive into Advanced Techniques

›
The flickering glow of the monitor was my only companion as the server logs spewed out an anomaly. One that absolutely shouldn't be t...

Investigating WMI Backdoors in Windows: A Deep Dive with Loki and Yara

›
The digital shadows lengthen as another compromised system whispers secrets. You’re staring into the abyss of a Windows machine, n...
›
Home
View web version
Powered by Blogger.