Tag Cloud
dfir
linux
malware
- Process Hollowing: a digital forensics case
- Process Hollowing: a reverse engineering case
- Practical Malware Analysis, Lab 11-2
- Practical Malware Analysis, Lab 11-1
- Intercepting malware traffic with Burp Proxy
- Malware Lab Howto: Hardening VirtualBox and the Windows VM
- Analysis of a malicious Word document
- Setting up an open-source malware analysis lab with Cuckoo
- Practical Malware Analysis, Lab 3-3
- Practical Malware Analysis, Lab 3-2
- Practical Malware Analysis, Lab 3-1
- Practical Malware Analysis, Lab 1-4
- Practical Malware Analysis, Lab 1-3
- Practical Malware Analysis, Lab 1-2
- Practical Malware Analysis, Lab 1-1
- Malware Static Analysis, part 1