2025-03-23 | Johannes Ullrich | Let's Talk About HTTP Headers. |
2024-06-15 | Didier Stevens | Overview of My Tools That Handle JSON Data |
2024-06-13 | Guy Bruneau | The Art of JQ and Command-line Fu [Guest Diary] |
2024-04-17 | Rob VandenBrink | The CVE's They are A-Changing! |
2024-02-15 | Jesse La Grew | [Guest Diary] Learning by doing: Iterative adventures in troubleshooting |
2023-06-22 | Brad Duncan | Qakbot (Qbot) activity, obama271 distribution tag |
2023-04-05 | Jesse La Grew | Exploration of DShield Cowrie Data with jq |
2023-03-29 | Didier Stevens | Extracting Multiple Streams From OLE Files |
2023-03-28 | Jesse La Grew | Network Data Collector Placement Makes a Difference |
2023-01-21 | Guy Bruneau | DShield Sensor JSON Log to Elasticsearch |
2023-01-08 | Guy Bruneau | DShield Sensor JSON Log Analysis |
2022-12-28 | Rob VandenBrink | Playing with Powershell and JSON (and Amazon and Firewalls) |
2022-08-08 | Johannes Ullrich | JSON All the Logs! |
2022-04-03 | Didier Stevens | jo |
2022-04-02 | Didier Stevens | curl 7.82.0 Adds --json Option |
2021-12-10 | Xavier Mertens | Python Shellcode Injection From JSON Data |
2021-10-21 | Brad Duncan | "Stolen Images Evidence" campaign pushes Sliver-based malware |
2021-08-29 | Guy Bruneau | Filter JSON Data by Value with Linux jq |
2021-08-13 | Brad Duncan | Example of Danabot distributed through malspam |
2020-11-22 | Didier Stevens | Quick Tip: Extracting all VBA Code from a Maldoc - JSON Format |
2020-01-02 | Xavier Mertens | Ransomware in Node.js |
2019-08-30 | Xavier Mertens | Malware Dropping a Local Node.js Instance |
2019-08-28 | Xavier Mertens | Malware Samples Compiling Their Next Stage on Premise |
2018-07-15 | Didier Stevens | Video: Retrieving and processing JSON data (BTC example) |
2018-07-14 | Didier Stevens | Retrieving and processing JSON data (BTC example) |
2017-11-13 | Guy Bruneau | jsonrpc Scanning for root account |
2016-12-13 | Xavier Mertens | UAC Bypass in JScript Dropper |
2016-08-28 | Guy Bruneau | Spam with Obfuscated Javascript |
2015-11-09 | John Bambenek | Protecting Users and Enterprises from the Mobile Malware Threat |
2012-06-25 | Guy Bruneau | Using JSDetox to Analyze and Deobfuscate Javascript |
2009-05-18 | Rick Wanner | JSRedir-R/Gumblar badness |
2009-02-25 | Andre Ludwig | Adobe Acrobat pdf 0-day exploit, No JavaScript needed! |