Feb. 11, 2023, 5:42 p.m. | Guided Hacking

Guided Hacking www.youtube.com

Let's learn how RedLine ships off your credentials after you get pwned.
Support us on GH: https://guidedhacking.com/register/
Support us on Patreon: https://patreon.com/guidedhacking
Support us on YT: https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw/join

The RedLine malware has grown to be a very well-known and widely-used theft tool for malicious actors, written in .NET. It can target many popular web browsers, cryptocurrency wallets, and other programs, and can also carry out typical functions like downloading and executing, as well as obtaining extensions.

RedLine Malware - Analyzing C2 …

analysis browsers communications credentials cryptocurrency cryptocurrency wallets extensions functions learn malicious malicious actors malware malware analysis popular pwned redline redline malware ships target theft tool wallets web web browsers well-known

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC