Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- AES encryption + (Encryption)
- Custom C&C encryption algorithm + (Encryption)
- Custom XOR-based encryption + (Encryption)
- Custom encryption algorithm + (Encryption)
- Diffie-Hellman + (Encryption)
- Elliptic curve encryption + (Encryption)
- Encryption of captured data + (Encryption)
- RC4 encryption + (Encryption)
- Steganography + (Encryption)
- Twofish encryption + (Encryption)
- .cerber + (File extension)
- .lukitus + (File extension)
- Automated transfer system (ATS) + (Injections)
- Javascript injection + (Injections)
- Man in the browser + (Injections)
- Webinject + (Injections)
- Java Signed Applet Social Engineering Code Execution + (Injections)
- Dynamic webinject configuration update + (Injections)
- SPDY grabbing + (Interception)
- Winpcap interception + (Interception)
- Email surveillance + (Interception)
- IM surveillance + (Interception)
- Keylogger + (Interception)
- Network sniffing + (Interception)
- Skype surveillance + (Interception)
- Voice-over-IP surveillance + (Interception)
- SMS interception + (Interception)
- MTAN interception + (Interception)
- Update + (Maintenance)
- Logging + (Maintenance)
- Network information gathering + (Maintenance)
- System information gathering + (Maintenance)
- Debugging + (Maintenance)
- Geolocalisation + (Maintenance)
- Phone home + (Maintenance)
- Port scanning + (Maintenance)
- Uninstall + (Maintenance)
- Upload minidump + (Maintenance)
- SMS payment + (Monetization)
- Bitcoin payment + (Monetization)
- MoneXy payment + (Monetization)
- Display advertising pop-ups + (Monetization)
- Premium calls + (Monetization)
- Premium SMS + (Monetization)
- Premium services + (Monetization)
- VMProtect + (Obfuscators)
- Themida + (Packers)
- Enigma + (Packers)
- Visual Basic crypter + (Packers)
- Custom packer + (Packers)
- UPX Packing + (Packers)
- UPX Protector + (Packers)
- TELock + (Packers)
- Armadillo + (Packers)
- Cross-infection + (Potency)
- HTTP proxy + (Proxy)
- SOCKS + (Proxy)
- SOCKS5 + (Proxy)
- Proxy + (Proxy)
- File execute + (Remote control)
- Command shell + (Remote control)
- File download + (Remote control)
- Query system processes + (Remote control)
- File upload + (Remote control)
- Kill system processes + (Remote control)
- Remote control + (Remote control)
- Run commands + (Remote control)
- Bitcoin mining + (Resource exploitation)
- CAPTCHA display to solve + (Resource exploitation)
- Click fraud + (Resource exploitation)
- Web server + (Resource exploitation)
- BIOS installation + (Rootkit)
- MBR installation + (Rootkit)
- Bootkit + (Rootkit)
- Rootkit + (Rootkit)
- Gmail spam + (Spam)
- SMS spam + (Spam)
- Phishing + (Spam)
- Send spam + (Spam)
- Produce spam from templates + (Spam)
- Hosts modification + (Traffic hijacking techniques)
- DNS configuration modification + (Traffic hijacking techniques)
- DNS hijack + (Traffic hijacking techniques)
- Pharming + (Traffic hijacking techniques)
- Startpage modification + (Traffic hijacking techniques)
- Search results manipulation + (Traffic hijacking techniques)
- URL redirection + (Traffic hijacking techniques)
- Component Object Model (COM) + (Tunnel)
- Mailslot + (Tunnel)