Feb. 11, 2023, 5:42 p.m. | Guided Hacking

Guided Hacking www.youtube.com

Let's learn how RedLine ships off your credentials after you get pwned.
Support us on GH: https://guidedhacking.com/register/
Support us on Patreon: https://patreon.com/guidedhacking
Support us on YT: https://www.youtube.com/channel/UCCMi6F5Ac3kQDfffWXQGZDw/join

The RedLine malware has grown to be a very well-known and widely-used theft tool for malicious actors, written in .NET. It can target many popular web browsers, cryptocurrency wallets, and other programs, and can also carry out typical functions like downloading and executing, as well as obtaining extensions.

RedLine Malware - Analyzing C2 …

analysis browsers communications credentials cryptocurrency cryptocurrency wallets extensions functions learn malicious malicious actors malware malware analysis popular pwned redline redline malware ships target theft tool wallets web web browsers well-known

Senior Security Officer

@ eSimplicity | Remote

Senior - Automated Cyber Attack Engineer

@ Deloitte | Madrid, España

Public Key Infrastructure (PKI) Senior Engineer

@ Sherwin-Williams | Cleveland, OH, United States

Consultant, Technology Consulting, Cyber Security - Privacy (Senior) (Multiple Positions) (1502793)

@ EY | Chicago, IL, US, 60606

Principal Associate, CSOC Analyst

@ Capital One | McLean, VA

Real Estate Portfolio & Corporate Security Lead

@ Lilium | Munich