Property:Feature category
Jump to navigation
Jump to search
This is a property of type Text.
.
A
Encryption +
Data theft +
Commercial model +
Armor +
Criminal services +
Armor +
Denial of service +
Injections +
B
Rootkit +
Backdoors +
Denial of service +
Data theft +
Encoding +
Data theft +
Resource exploitation +
Monetization +
Data theft +
Data theft +
Data theft +
Distribution vector +
Criminal services +
C
Resource exploitation +
Audio visual +
Data theft +
Armor +
Data theft +
Resource exploitation +
Remote control +
Tunnel +
Data theft +
Data theft +
Criminal services +
Data theft +
Potency +
Encryption +
Encryption +
Encryption +
Packers +
D
Traffic hijacking techniques +
Traffic hijacking techniques +
Encoding +
Data theft +
Armor +
Annoyance +
Encryption +
Annoyance +
Monetization +
Annoyance +
Data theft +
DNS and URL features +
DNS and URL features +
DNS and URL features +
Injections +
E
Encryption +
Data theft +
Data theft +
Interception +
Distribution vector +
Annoyance +
Annoyance +
Annoyance +
Encryption +
Annoyance +
F
Data theft +
Data theft +
Data theft +
Distribution vector +
Remote control +
Remote control +
Data theft +
Remote control +
Data theft +
Data theft +
Data theft +
Data theft +
Data theft +
G
Maintenance +
Spam +
H
Denial of service +
Data theft +
Proxy +
DNS and URL features +
Armor +
Traffic hijacking techniques +
I
Data theft +
Interception +
Data theft +
J
Data theft +
Encoding +
Injections +
K
Remote control +
L
Armor +
Denial of service +
Annoyance +
Data validation +
M
Rootkit +
Annoyance +
Distribution vector +
Interception +
Data theft +
Injections +
Data theft +
Audio visual +
Monetization +
Armor +
Data theft +
Browser extensions +
N
Data theft +
Maintenance +
Interception +
O
Annoyance +
Data theft +
P
Data theft +
Denial of service +
Data theft +
Criminal services +
Data theft +
Maintenance +
Data theft +
Armor +
Maintenance +
Monetization +
Monetization +
Monetization +
Q
Remote control +
R
Encryption +
Distribution vector +
Data validation +
Remote control +
Distribution vector +
Distribution vector +
Remote control +
S
Interception +
Monetization +
Interception +
Distribution vector +
Audio visual +
Traffic hijacking techniques +
Data theft +
Armor +
Distribution vector +
Interception +
Distribution vector +
Distribution vector +
Data theft +
Traffic hijacking techniques +
Encryption +
Armor +
Armor +
Maintenance +
T
Distribution vector +
Criminal services +
Data theft +
Encryption +
U
Packers +
Packers +
Traffic hijacking techniques +
Distribution vector +
Maintenance +
V
Data theft +
Backdoors +
Audio visual +
Armor +
Packers +
Data theft +
Interception +
W
Data theft +
Resource exploitation +
Data theft +
Interception +
Data theft +
X
Encoding +
Y
Distribution vector +