Skip to content
CyberSecThreat_logo
  • Home
  • Our ServicesExpand
    • Free Degaussing & Data Destruction of Magnetic-Only Hard Disk Drive Program
    • NextGen IT Asset Disposition (ITAD)
    • Data Destruction Service – APJ
    • Data Disposal Service – Taiwan
    • vCISO (Virtual CISO) Services
    • Data Recovery
    • OSCP
  • ProductsExpand
      • CYBERSECURITY
      • DATA DISPOSAL
      • DIGITAL FORENSICS

      CYBERSECURITY


      Mobile App Security

      Appdome Logo
      Appdome Logo

      Security Awareness Training

      AKO Labs CyberSecurity Training
      AKO Labs

      SOAR

      Swimlane-Incident-Dashboard
      Swimlane Turbine – AI Enabled Automation Platform

      Cyber Threat Intelligence

      Recorded Future Intelligence Cloud
      Recorded Future Intelligence Cloud – GPT Powered CTI

      DATA DISPOSAL


      Media Shredder/Destroyer

      Server Hard Disk Shredder
      Server Hard Disk Shredder

      Degauss Verification

      Patented Degauss Verification Magnetic Sticker
      Patented Degauss Verification Magnetic Sticker

      Degausser

      NSA Degausser
      NSA Degausser

      Duplicator & Wiper

      YEC Demi
      YEC Demi

      DIGITAL FORENSICS


      Computer Forensics

      TALINO Forensic Workstation
      TALINO Forensic Workstation

      Mobile Forensics

      MD-NEXT
      MD-NEXT

      CyberSecurity

      Cryptocurrency Intelligence Platform
      Cryptocurrency Intelligence Platform

      Public Security & Intelligence Solutions

      BTS Tracker
      BTS Tracker
  • ResourcesExpand
    • Blog
    • Vulnerability Research
    • Free ToolsExpand
      • Splunk
  • CompanyExpand
    • About CyberSecThreat
    • News
    • Contact Us
    • About Founder
    • ISO27001 ISMS Policy
  • zh_TW繁體中文
CyberSecThreat_logo
  • x64dbg LaunchProgram find password3
    Blue Team | Red Team | Reverse Engineering

    Retrieve password from exe(3)

    ByKelvin Yip December 6, 2020April 1, 2024

    This article is part three of “Extract/Dump/Retrieve password from exe” series. Previously, we have discussed unpack/decompile an executable back to script in part one and dumping connection string credentials in part two. In this article, we will explore how we can retrieve passwords from exe using other techniques and tools such as Process Monitor from…

    Read More Retrieve password from exe(3)Continue

  • VS2019 VC# MSSQL x64 strings
    Blue Team | Red Team | Reverse Engineering

    Dump password from exe(2)

    ByKelvin Yip November 26, 2020April 1, 2024

    This article is actually part two of “Extract/Dump password from exe” series. In part one, we focused on unpacking executable generated by script converter such as PyInstaller, Py2exe and AutoIt. In short, we will focus on executable compiled by Visual Studio and Delphi in this article. Basically, we will try to understand what information is…

    Read More Dump password from exe(2)Continue

  • Splunk Threat Activity Detected
    Blue Team | CTI | Cyber Threat Intelligence | SOC | Splunk | Threat Intelligence

    Splunk local threat intel

    ByKelvin Yip October 4, 2020April 1, 2024

    Why yet another Splunk local threat intel article ? Obviously, there are many excellent articles: Unlike other articles, we mainly focus on common operational issues of Splunk local threat intel usage including: Before we start to discuss those operational issues, let’s explore the workflow of threat intelligence framework. Basically, it consists of 4 phases: Threat…

    Read More Splunk local threat intelContinue

Page navigation

Previous PagePrevious 1 2 3 4 5 … 7 Next PageNext
CyberSecThreat Logo

ISO/IEC 27001:2013 (ARES/TW/I2208053I)

Twitter Linkedin Github YouTube Facebook Email
  • zh_TW繁體中文

Products

  • CyberSecThreat website logo S/N Scanner – OCR & Barcode
  • Intezer Logo Intezer - AI Powered Autonomous SOC Platform
  • AUTOCRYPT Logo AUTOCRYPT
  • Appdome Logo Appdome
  • Kount - an Equifax Company Logo Kount
  • AKO Labs CyberSecurity Training AKO Labs NT$9,999,999.00
  • Photo that demonstrates our Patented Degauss Verification Magnetic Sticker Patented Degauss Verification Magnetic Sticker NT$65.00 Original price was: NT$65.00.NT$58.00Current price is: NT$58.00.
  • CyberSecThreat Swimlane Logo Swimlane Turbine - AI Enabled Automation Platform

Services

  • Free Degaussing & Data Destruction of Magnetic-Only Hard Disk Drive Program
  • NextGen IT Asset Disposition (ITAD)
  • Data Destruction Service – APJ
  • Data Disposal Service – Taiwan
  • vCISO (Virtual CISO) Services
  • Data Recovery
  • OSCP

Resources

  • Blog
  • Vulnerability Research
  • Free Splunk Apps

Company

  • About CyberSecThreat
  • News
  • Contact Us
  • About Founder
  • ISO27001 ISMS Policy

© COPYRIGHT 2026 - CYBERSECTHREAT CORPORATION LIMITED. ALL RIGHTS RESERVED.

Scroll to top
  • Home
  • Services
    • Free Degaussing & Data Destruction of Magnetic-Only Hard Disk Drive Program
    • NextGen IT Asset Disposition (ITAD)
    • Data Destruction Service – APJ
    • Data Disposal Service – Taiwan
    • vCISO (Virtual CISO) Services
    • Data Recovery
    • OSCP
  • Products
    • CyberSecurity
      • Cyber Threat Intelligence
      • SOAR
      • Security Awareness Training
      • Visionary Defense
    • DATA DISPOSAL
      • Media Shredder/Destroyer
      • Degauss Verification
      • Degaussers
      • Duplicator & Wiper
    • DIGITAL FORENSIC
      • Computer Forensics
      • Mobile Forensics
      • Cyber Security
      • Public Security & Intelligence Solutions
  • Resources
    • Blog
    • Vulnerability Research
    • Free Tools
      • Splunk Apps
  • Company
    • About Us
    • News
    • Contact Us
    • About Founder
    • ISO27001 ISMS Policy
  • zh_TW繁體中文
Search