Threat Intelligence Guides
Tracking APT SideWinder Domains By Combining Regex Patterns, Whois Records and Domain Registrars
Tracking APT SideWinder Domains With Regular Expressions, Whois Records and Domain Registrars
Threat Intelligence Guides
Tracking APT SideWinder Domains With Regular Expressions, Whois Records and Domain Registrars
Threat Intelligence Guides
Tracking Malware Infrastructure Through Subdomain Analysis
Threat Intelligence Guides
Identifying malicious infrastructure through hardcoded TLS Certificates and Subdomains.
Threat Intelligence Guides
Finding phishing domains passive DNS tooling and 302 redirects.
Threat Intelligence Guides
Leveraging Passive DNS to identify APT infrastructure. Building on public intelligence reports.
Threat Intelligence Guides
Malware Infrastructure Tracking Using Passive DNS Intelligence.
Threat Intelligence Guides
Identifying malware infrastructure with the FOFA scanner.
Threat Intelligence Guides
Catching 83 Qakbot Servers using Regular Expressions.
Threat Intelligence Guides
Creating Regex Signatures on TLS Certificates with Censys.
Threat Intelligence Guides
Refining Queries and Identifying Suspicious servers using Censys.
Threat Intelligence Guides
More interesting and practical queries for identifying malware infrastructure.
Threat Intelligence Guides
Identifying Malware infrastructure by combining weak pivot points.