Search by property
Jump to navigation
Jump to search
This page provides a simple browsing interface for finding entities described by a property and a named value. Other available search interfaces include the page property search, and the ask query builder.
List of results
- Paypal password theft + (Data theft)
- Pidgin password theft + (Data theft)
- Sendspace password theft + (Data theft)
- Twitter password theft + (Data theft)
- Web password theft + (Data theft)
- Firefox cookie theft + (Data theft)
- Luhn algorithm check + (Data validation)
- Regular expression filtering + (Data validation)
- ApacheKiller + (Denial of service)
- POST flood + (Denial of service)
- SYN flood + (Denial of service)
- UDP flood + (Denial of service)
- Bandwidth flood + (Denial of service)
- Booter + (Denial of service)
- Slow POST + (Denial of service)
- TCP flood + (Denial of service)
- HTTP flood + (Denial of service)
- DDoS + (Denial of service)
- GET flood + (Denial of service)
- Layer 7 attack + (Denial of service)
- Slowloris + (Denial of service)
- GRE flood + (Denial of service)
- USB vector + (Distribution vector)
- Torrent vector + (Distribution vector)
- YIM vector + (Distribution vector)
- Email worm + (Distribution vector)
- MSN vector + (Distribution vector)
- Brute-force + (Distribution vector)
- Worm + (Distribution vector)
- Facebook vector + (Distribution vector)
- RDP vector + (Distribution vector)
- Removable drive vector + (Distribution vector)
- SQL Injection + (Distribution vector)
- Shared drive vector + (Distribution vector)
- Skype vector + (Distribution vector)
- Social network vector + (Distribution vector)
- Right-to-left override + (Distribution vector)
- Base64 encoding + (Encoding)
- XOR encoding + (Encoding)
- Data compression + (Encoding)
- JPEG encoding + (Encoding)
- AES encryption + (Encryption)
- RC4 encryption + (Encryption)
- Custom XOR-based encryption + (Encryption)
- Elliptic curve encryption + (Encryption)
- Encryption of captured data + (Encryption)
- Custom C&C encryption algorithm + (Encryption)
- Steganography + (Encryption)
- Diffie-Hellman + (Encryption)
- Twofish encryption + (Encryption)
- Custom encryption algorithm + (Encryption)
- Automated transfer system (ATS) + (Injections)
- Javascript injection + (Injections)
- Man in the browser + (Injections)
- Webinject + (Injections)
- Java Signed Applet Social Engineering Code Execution + (Injections)
- Dynamic webinject configuration update + (Injections)
- SPDY grabbing + (Interception)
- Winpcap interception + (Interception)
- Email surveillance + (Interception)
- IM surveillance + (Interception)
- Keylogger + (Interception)
- Network sniffing + (Interception)
- Skype surveillance + (Interception)
- Voice-over-IP surveillance + (Interception)
- SMS interception + (Interception)
- MTAN interception + (Interception)
- Update + (Maintenance)
- Logging + (Maintenance)
- Network information gathering + (Maintenance)
- System information gathering + (Maintenance)
- Debugging + (Maintenance)
- Geolocalisation + (Maintenance)
- Phone home + (Maintenance)
- Port scanning + (Maintenance)
- Uninstall + (Maintenance)
- Upload minidump + (Maintenance)
- SMS payment + (Monetization)
- Bitcoin payment + (Monetization)
- MoneXy payment + (Monetization)
- Display advertising pop-ups + (Monetization)
- Premium calls + (Monetization)
- Premium SMS + (Monetization)
- Premium services + (Monetization)
- VMProtect + (Obfuscators)
- Themida + (Packers)
- Enigma + (Packers)
- Visual Basic crypter + (Packers)
- Custom packer + (Packers)
- UPX Packing + (Packers)
- UPX Protector + (Packers)
- TELock + (Packers)
- Armadillo + (Packers)
- Cross-infection + (Potency)
- HTTP proxy + (Proxy)
- SOCKS + (Proxy)
- SOCKS5 + (Proxy)
- Proxy + (Proxy)
- File execute + (Remote control)
- Command shell + (Remote control)