05/04

NXploit - YouTube

http://youtube.com/@Nxploited
NXploit - YouTube

StealC malware enhanced with stealth upgrades and data theft tools

https://www.bleepingcomputer.com/news/security/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools/
StealC malware enhanced with stealth upgrades and data theft tools

The difference between adversary simulation and adversary emulation is… | Terry Thibault | 12 comments

https://www.linkedin.com/posts/redteamer_the-difference-between-adversary-simulation-activity-7323783949678215168-WIjI
The difference between adversary simulation and adversary emulation is… | Terry Thibault | 12 comments

Writing a Ghidra processor module

https://irisc-research-syndicate.github.io/2025/02/14/writing-a-ghidra-processor-module/
Writing a Ghidra processor module