tag
Obfuscation
5 posts
- Gremlin Stealer's Evolved Tactics: Hiding in Plain Sight With Resource Files
- GTIG AI Threat Tracker: Adversaries Leverage AI for Vulnerability Exploitation, Augmented Operations, and Initial Access
- The Cost of Understanding: LLM-Driven Reverse Engineering vs Iterative LLM Obfuscation
- From APT28 to RePythonNET: automating .NET malware analysis
- Latest Xloader Obfuscation Code & C2 Protocol | ThreatLabz