Date Author Title

HASH SET

2025-01-02Xavier MertensGoodware Hash Sets

HASH

2025-01-02/a>Xavier MertensGoodware Hash Sets
2021-06-19/a>Xavier MertensEasy Access to the NIST RDS Database
2021-04-24/a>Guy BruneauBase64 Hashes Used in Web Scanning
2021-04-19/a>Jan KoprivaHunting phishing websites with favicon hashes
2020-08-22/a>Guy BruneauRemote Desktop (TCP/3389) and Telnet (TCP/23), What might they have in Common?
2020-05-15/a>Rob VandenBrinkHashes in PowerShell
2018-06-27/a>Renato MarinhoSilently Profiling Unknown Malware Samples
2017-09-19/a>Jim ClausingNew tool: mac-robber.py
2017-09-06/a>Adrien de BeaupreModern Web Application Penetration Testing , Hash Length Extension Attacks
2016-08-22/a>Russ McReeRed Team Tools Updates: hashcat and SpiderFoot
2015-08-31/a>Xavier MertensDetecting file changes on Microsoft systems with FCIV
2015-03-18/a>Daniel WesemannPass the hash!
2015-02-17/a>Rob VandenBrinkoclHashcat 1.33 Released
2015-02-10/a>Mark BaggettDetecting Mimikatz Use On Your Network
2014-09-19/a>Guy BruneauAdded today in oclhashcat 131 Django [Default Auth] (PBKDF2 SHA256 Rounds Salt) Support - http://hashcat.net/hashcat/
2014-08-22/a>Richard PorterOCLHashCat 1.30 Released
2013-12-10/a>Rob VandenBrinkThose Look Just Like Hashes!
2013-09-05/a>Rob VandenBrinkBuilding Your Own GPU Enabled Private Cloud
2013-08-22/a>Russ McReeRead of the Week: A Fuzzy Future in Malware Research
2013-06-11/a>Swa FrantzenStore passwords the right way in your application
2012-10-04/a>Johannes UllrichCyber Security Awareness Month - Day 4: Crypto Standards
2012-04-02/a>Johannes UllrichSHA 1-2-3
2011-06-28/a>Johannes UllrichHashing Passwords
2010-02-25/a>Chris CarboniPass The Hash
2010-02-15/a>Johannes UllrichNew ISC Tool: Whitelist Hash Database
2009-10-23/a>Johannes UllrichLittle new tool: reversing md5/sha1 hashes http://isc.sans.org/tools/reversehash.html

SET

2025-01-02/a>Xavier MertensGoodware Hash Sets
2023-12-10/a>Guy BruneauHoneypots: From the Skeptical Beginner to the Tactical Enthusiast
2023-07-13/a>Jesse La GrewDShield Honeypot Maintenance and Data Retention
2022-12-21/a>Guy BruneauDShield Sensor Setup in Azure
2022-09-15/a>Xavier MertensMalicious Word Document with a Frameset
2020-11-24/a>Johannes UllrichThe special case of TCP RST
2019-04-02/a>Johannes UllrichFake AV is Back: LaCie Network Drives Used to Spread Malware
2017-04-27/a>Johannes UllrichBGP Hijacking: The Internet is Still/Again Broken
2016-12-11/a>Russ McReeSteganography in Action: Image Steganography & StegExpose
2016-09-30/a>Xavier MertensAnother Day, Another Malicious Behaviour
2013-07-12/a>Johannes UllrichMicrosoft Teredo Server "Sunset"
2013-01-04/a>Daniel WesemannBlue for Reset?
2011-06-22/a>Guy BruneauWordPress Forces Password Reset
2006-10-02/a>Jim ClausingBack to green, but the exploits are still running wild
2006-09-30/a>Robert Danford*WebViewFolderIcon ActiveX control exploit(s) in the wild
2006-09-30/a>Swa FrantzenYellow: WebViewFolderIcon setslice exploit spreading
2006-09-28/a>Swa FrantzenMSIE: One patched, one pops up again (setslice)
2006-09-28/a>Tom ListonSetslice Killbit Apps