- Part 2 of my ransomware architecture writeup! - @securfreakazoid https://securityshenaningans.medium.com/architecture-of-a-ransomware-2-2-e22d8eb11cee 6 comments netsec
Linking pages
Linked pages
- GitHub - Nuitka/Nuitka: Nuitka is a Python compiler written in Python. It's fully compatible with Python 2.6, 2.7, 3.4-3.12. You feed it your Python app, it does a lot of clever things, and spits out an executable or extension module. https://github.com/Nuitka/Nuitka 181 comments
- Petya and NotPetya - Wikipedia https://en.wikipedia.org/wiki/Petya_(malware) 134 comments
- PyInstaller Manual — PyInstaller 5.8.0 documentation http://www.pyinstaller.org 89 comments
- Medium https://medium.com/m/signin?isDraft=1&operation=login&redirect=https%3A%2F%2Fmedium.com%2F%40jamie_34747%2F79d382edf22b%3Fsource%3D 19 comments
- Master boot record - Wikipedia https://en.wikipedia.org/wiki/Master_boot_record 19 comments
- secrets â Generate secure random numbers for managing secrets — Python 3.11.2 documentation https://docs.python.org/3/library/secrets.html#secrets.randbelow 6 comments
- Architecture of a ransomware (1/2) | by Security Shenanigans | InfoSec Write-ups https://securityshenaningans.medium.com/architecture-of-a-ransomware-1-2-1b9fee757fcb 5 comments
- Shade (Troldesh) ransomware shuts down and releases decryption keys | ZDNET https://www.zdnet.com/article/shade-troldesh-ransomware-shuts-down-and-releases-all-decryption-keys/ 1 comment
- cryptography - Why shouldn't we roll our own? - Information Security Stack Exchange https://security.stackexchange.com/questions/18197/why-shouldnt-we-roll-our-own 0 comments
- Initialization vector - Wikipedia https://en.wikipedia.org/wiki/Initialization_vector 0 comments
- Trapdoor function - Wikipedia https://en.wikipedia.org/wiki/Trapdoor_function 0 comments
Related searches:
Search whole site: site:medium.com
Search title: Architecture of a ransomware (2/2) | by Security Shenanigans | InfoSec Write-ups
See how to search.