COM Objects Hijacking ~ VirusTotal BlogThe COM Hijacking technique is often utilized by threat actors and various malware families to achieve both persistence and privilege escal...#com-objects#windows#windows-malware·blog.virustotal.com·Mar 8, 2024COM Objects Hijacking ~ VirusTotal Blog
MalAPI.ioMalAPI.io maps Windows APIs to common techniques used by malware.#windows-api#yara#ttps#windows-malware·malapi.io·Apr 5, 2023MalAPI.io