Threat Intelligence
Uncovering Malicious Infrastructure with DNS Pivoting
Demonstrating DNS pivoting and analysis techniques for uncovering Malicious infrastructure
Threat Intelligence
Demonstrating DNS pivoting and analysis techniques for uncovering Malicious infrastructure
Threat Intelligence
Identifying malware infrastructure with the FOFA scanner.
Advanced
Catching 83 Qakbot Servers using Regular Expressions.
Advanced
Creating Regex Signatures on TLS Certificates with Censys.
Beginner
Refining Queries and Identifying Suspicious servers using Censys.
Advanced
More interesting and practical queries for identifying malware infrastructure.
Beginner
Identifying Malware infrastructure by combining weak pivot points.
Beginner
Identifying Simple pivot points in RisePro Stealer Infrastructure using Censys.
Intermediate
Threat Intelligence Queries with Censys.
Intermediate
An informal page for storing Censys/Shodan queries
Beginner
Identifying Amadey Bot Servers Using Shodan.
Beginner
Identification of Laplas infrastructure with Shodan and Censys.
Intermediate
Extraction of Quasar C2 configuration via Dnspy, and using this information to pivot to additional servers utilising Shodan and Censys.