Dissecting an Android stalkerware
Analysis of an Italian stalkerware for Android
Analysis of an Italian stalkerware for Android
Analysis of a phishing kit targeting ING Bank
Flooding a phishing kit with fake data to make it harder for threat actors
Analysis of a PHP file used to generate a document containing malicious macros for Emotet infection
Writing a super simple proof of concept for a ransowmare in Go
Analysis of a phishing kit targeting LinkedIn users
Tuning the Random Forest algorithm to detect phishing pages
Analysis of a phishing kit targeting Outlook and Office365 users
Tuning the Decision Trees algorithm to detect phishing pages
Solutions for the first lab of ‘Practical malware analysis’
Discussing the F-Droid apps I use everyday