Все публикации

00 - Welcome to Creating Shellcode and Prerequisistes

Malware Mondays #09 - File Identification and Hashing Algorithms

Network Analysis & Packet Capture with Arkime's Creator Andy Wick

04 - Using Fakenet-NG for Network Emulation and PCAP Generation

03 - Processing PCAPs in Offline Mode

02 - Manually Updating the Ruleset with Emerging Threats Open

01 - Installing Suricata into the FLARE-VM

08 - Using ZwSetInformationThread to Detach Debuggers

Explore Command-Line Driven Binary Transformations with Binary Refinery and its Jesko Huttenhain

Going Old School – Malware Sharing and Large-Scale Detection in the Early 2000s with Danny Quist

Mac Malware with L0Psec – Triage, reversing and ARM64

07 - Creating Trampolines and Re-Obfuscating Function Pointers

What’s New in Security Onion? Join Creator Doug Burks to Learn the Latest!

Malware Analysis with The Cyber Yeti

Learn About Evasive Malware with Threat Researcher and Author Kyle Cucci

Enabling Rule Profiling in Suricata - Compiling from Source

Learn How to Dissect Binary Files with the Creator of Malcat!

06 - Finding Functions from the Export Directory and Using Seeds to Compute Checksums

Ask Me Anything: Education, Training, and Certifications

05 - How Lockbit Uses the DLL Name as a Seed for API Hashing

04 - Walking the PEB, Enhancing IDA's Output w/ Structures, and Unlocking the Key to Runtime-Linking

03 - Identifying Signs of Runtime-Linking and Building Context for API Hashes

02 - Performing Basic Triage Analysis and Unpacking with x64dbg