Suche senden
Hochladen
Linux Malware Analysis
•
2 gefällt mir
•
2,642 views
C
Cysinfo Cyber Security Community
Folgen
Linux Malware Analysis
Weniger lesen
Mehr lesen
Software
Melden
Teilen
Melden
Teilen
1 von 37
Jetzt herunterladen
Downloaden Sie, um offline zu lesen
Empfohlen
Catálogo de material deportivo y equipamiento para clubes, centros educativos, centros deportivos, gimnasios y particulares.
Catálogo Elk Sport 2016 2017
Catálogo Elk Sport 2016 2017
Elk Sport
Alan Johnson Resume
Alan Johnson Resume
alan Johnson
If you were a carpenter, would your skills at building be more important than the tools you use to build? Skills, right? Tools are just a means to an end. So why do developers think the language they use defines the problems they solve? This talk will take a look at misconceptions across the board, some experiences, both positive and negative, people have had crossing barriers to new languages, and show some of the benefits thinking of one's self as a coder and not a "Ruby coder" or a "PHP dev" can have on being a better problem solver.
Urban legends - PJ Hagerty - Codemotion Amsterdam 2017
Urban legends - PJ Hagerty - Codemotion Amsterdam 2017
Codemotion
Many vendors sell “security analytics” tools. Also, some organizations built their own security analytics toolsets and capabilities using Big Data technologies and approaches. How do you find the right approach for your organization and benefit from this analytics boom? How to start your security analytics project and how to mature the capabilities? (Source: RSA USA 2016-San Francisco)
Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use Cases
Priyanka Aash
Resume
Resume
Bailey Gaston
Respond proactively to threats like a defense contractor. It’s more realistic than you might think! A practical guide of how to build intelligence-driven cyber defenses using open source software, based on real implementations of best practices, adapted from the Lockheed Martin Cyber Kill Chain model.
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Sean Whalen
Trending tools and languages for data visualization makers, but also ideas to get more inspiration.
Data Visualization on the Tech Side
Data Visualization on the Tech Side
Mathieu Elie
General int
Micro Services - Small is Beautiful
Micro Services - Small is Beautiful
Eberhard Wolff
Empfohlen
Catálogo de material deportivo y equipamiento para clubes, centros educativos, centros deportivos, gimnasios y particulares.
Catálogo Elk Sport 2016 2017
Catálogo Elk Sport 2016 2017
Elk Sport
Alan Johnson Resume
Alan Johnson Resume
alan Johnson
If you were a carpenter, would your skills at building be more important than the tools you use to build? Skills, right? Tools are just a means to an end. So why do developers think the language they use defines the problems they solve? This talk will take a look at misconceptions across the board, some experiences, both positive and negative, people have had crossing barriers to new languages, and show some of the benefits thinking of one's self as a coder and not a "Ruby coder" or a "PHP dev" can have on being a better problem solver.
Urban legends - PJ Hagerty - Codemotion Amsterdam 2017
Urban legends - PJ Hagerty - Codemotion Amsterdam 2017
Codemotion
Many vendors sell “security analytics” tools. Also, some organizations built their own security analytics toolsets and capabilities using Big Data technologies and approaches. How do you find the right approach for your organization and benefit from this analytics boom? How to start your security analytics project and how to mature the capabilities? (Source: RSA USA 2016-San Francisco)
Demystifying Security Analytics: Data, Methods, Use Cases
Demystifying Security Analytics: Data, Methods, Use Cases
Priyanka Aash
Resume
Resume
Bailey Gaston
Respond proactively to threats like a defense contractor. It’s more realistic than you might think! A practical guide of how to build intelligence-driven cyber defenses using open source software, based on real implementations of best practices, adapted from the Lockheed Martin Cyber Kill Chain model.
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Sean Whalen
Trending tools and languages for data visualization makers, but also ideas to get more inspiration.
Data Visualization on the Tech Side
Data Visualization on the Tech Side
Mathieu Elie
General int
Micro Services - Small is Beautiful
Micro Services - Small is Beautiful
Eberhard Wolff
Prometheus is a next-generation monitoring system with a time series database at it's core. Once you have a time series database, what do you do with it though? This talk will look at getting data in, and more importantly how to use the data you collect productively. Contact us at prometheus@robustperception.io
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Brian Brazil
A report issued March 25, 2013 by the U.S. Geological Survey titled "Landscape Consequences of Natural Gas Extraction in Allegheny and Susquehanna Counties, Pennsylvania, 2004–2010." The report, using a series of maps and data, purports to show that drilling has lead to "carving up" wildlife habitats in some forests.
USGS Report on the Impact of Marcellus Shale Drilling on Forest Animal Habitats
USGS Report on the Impact of Marcellus Shale Drilling on Forest Animal Habitats
Marcellus Drilling News
BsidesDelhi Security Automation for Red and Blue Teams
Bsides Delhi Security Automation for Red and Blue Teams
Bsides Delhi Security Automation for Red and Blue Teams
Suraj Pratap
This presentation guides students through the process of using the words although and despite to combine sentences.
Combining sentences with the words although and despite
Combining sentences with the words although and despite
Emily Kissner
Heterogenous Persistence - Percona Live - USA 2016
Heterogenous Persistence
Heterogenous Persistence
Jervin Real
Intro talk to kick off the Adaptive Content Show & Tell at #AustinContent.
Adaptive Content Show & Tell - Austin Content
Adaptive Content Show & Tell - Austin Content
cdelk
Performance Benchmarking of Clouds Evaluating OpenStack
Performance Benchmarking of Clouds Evaluating OpenStack
Performance Benchmarking of Clouds Evaluating OpenStack
Pradeep Kumar
We live in an era where the world is more connected than ever before and the trajectory is such that data relationships will only continue to increase with no signs of slowing down. Connected data is the key to your business succeeding and growing in today’s connected world. Leading enterprises will be the ones that utilize relationship-centric technologies to leverage connections from their internal operations and supply chain to their customer and user interactions. This ability to utilize connected data to understand all the nuanced relationships within their organization will propel them forward as they act on more holistic insights. Every organization needs a knowledge graph because connected data is an essential foundation to advancing business. Knowledge graphs provide: - Increased visibility between internal groups - Efficiency gains - Cross-functional data collaboration - Core complete and reliable business insights - Better customer engagement The live presentation and discussion can be found here: https://www.youtube.com/watch?v=RQGdw82rAes Additional reading on why connected data is beneficial: https://www.graphgrid.com/why-connected-data-is-more-useful/ Connected data solutions available by Benjamin and his team via GraphGrid and AtomRain: https://www.graphgrid.com and https://www.atomrain.com
Journey of The Connected Enterprise - Knowledge Graphs - Smart Data
Journey of The Connected Enterprise - Knowledge Graphs - Smart Data
Benjamin Nussbaum
Docker is quickly becoming an invaluable development and deployment tool for many organizations. Come and spend the day learning about what Docker is, how to use it, how to integrate it into your workflow, and build an environment that works for you and the rest of your team. This hands-on tutorial will give you the kick-start needed to start using Docker effectively.
Docker for PHP Developers - Madison PHP 2017
Docker for PHP Developers - Madison PHP 2017
Chris Tankersley
Tony Wilmer, Lead DevOps Pipeline Engineer at DigitalGlobe, gives his presentation on microservices at the DevOps Leadership Summit in Boston MA.
Using a Canary Microservice to Validate the Software Delivery Pipeline
Using a Canary Microservice to Validate the Software Delivery Pipeline
XebiaLabs
Selma_CV1
Selma_CV1
Selma Elsaeed
One of the key strengths of JVM is automatic memory management (Garbage Collection). Its understanding can help in writing better applications. This becomes all the more important as enterprise server applications have large amount of live heap data and significant parallel threads. Until recently, main collectors were parallel collector and concurrent-mark-sweep (CMS) collector. This presentation introduces the various Garbage Collectors and compares the CMS collector against its replacement, a new implementation in Java7 i.e. G1. It is characterized by a single contiguous heap which is split into same-sized regions. In fact if your application is still running on the 1.5 or 1.6 JVM, a compelling argument to upgrade to Java 7 is to leverage G1.
Java Garbage Collectors – Moving to Java7 Garbage First (G1) Collector
Java Garbage Collectors – Moving to Java7 Garbage First (G1) Collector
Gurpreet Sachdeva
This week we started a new section of Acts where Luke turns our attention away what was going on in the Temple courts to the inevitable challenges of exponential growth and diversity. We evaluated internal evidence that Luke was possibly using a new source(s) for this section including the introduction of previously unused terms which are common in his Gospel and throughout the rest of Acts. As the group of Christ followers experienced exponential growth, it was only a matter of time before logistical issues arose which could potentially derail the unity they were experiencing. We discussed the difference between "Hebrews" and "Hellenists" in this passage, comparing various translations to the original Greek, and we discussed how this distinction is evidence of a new source for our historian author.
Acts 6:1-7 ~ Organic Growth of the Early Church (pt. 1)
Acts 6:1-7 ~ Organic Growth of the Early Church (pt. 1)
Laura Zielke
The Complete Transformation from Offline to Online Magento Implementation of a B2B Platform – a Case Study. This case study shows how we managed to reach 100.000.000 EUR of online revenue, within only 3 quarters last year.
B2B Digital Transformation - Case Study
B2B Digital Transformation - Case Study
Divante
Erkekte, gebelikte, daha önce meme veya aksiller cerrahi uygulananlarda aksillaya yaklaşım
Doç. Dr. Mehmet Ali GÜLÇELİK
Doç. Dr. Mehmet Ali GÜLÇELİK
Mehmet Ali GÜLÇELİK
Everyone wants their little application to grow up to be a strong, well-rounded, and useful set of code. We organize, we unit test, we market research, and then we push to production. All is good in the world until now you need two web servers, and multiple back-end servers, and more DB servers than you have fingers. Your code starts to act weird, there are errors in some places but not others. Fires, floods, and locusts all start to appear, and how do you manage it? Let's look at some real-life examples, along with some tools and tips, for managing those fires as your application grows.
Failing at Scale - PNWPHP 2016
Failing at Scale - PNWPHP 2016
Chris Tankersley
Presented at the Chicago Riak Meetup, 20 Oct 2015. Slides walk through a demo of automating the building of a full stack Riak KV cluster from scratch, and then populating it with 250,000,000 time series data points.
Turnkey Riak KV Cluster
Turnkey Riak KV Cluster
Joe Olson
LeanIX ist ein Startup aus Bonn, dass eine Software-as-a-Service Lösung anbieter, mit der Unternehmen wie z.B. Zalando, Axel Springer, RWE oder Helvetia Versicherung ihre IT Landschaft dokumentieren. Dank eines modernen Green-Blue Deployments können Releases und Hotfixes im laufenden Betrieb ausgerollt werden, ohne dass die Nutzer des Systems davon beeinträchtigt werden. In diesem Talk beim Bonn Agile Meetup gibt Co-CEO André Einblick in die Konzepte und zugrundeliegenden Technologien wie Docker, Ansible und Jenkins. === LeanIX offers an innovative software-as-a-service solution for Enterprise Architecture Management (EAM), based either in a public cloud or the client’s data center. Companies like Adidas, Axel Springer, Helvetia, RWE, Trusted Shops and Zalando use LeanIX Enterprise Architecture Management tool. Free Trial: http://bit.ly/LeanIXFreeTrial
Continuous deployment in LeanIX @ Bonn Agile
Continuous deployment in LeanIX @ Bonn Agile
LeanIX GmbH
Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K A
Cysinfo Cyber Security Community
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Cysinfo Cyber Security Community
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
Cysinfo Cyber Security Community
Weitere ähnliche Inhalte
Andere mochten auch
Prometheus is a next-generation monitoring system with a time series database at it's core. Once you have a time series database, what do you do with it though? This talk will look at getting data in, and more importantly how to use the data you collect productively. Contact us at prometheus@robustperception.io
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Brian Brazil
A report issued March 25, 2013 by the U.S. Geological Survey titled "Landscape Consequences of Natural Gas Extraction in Allegheny and Susquehanna Counties, Pennsylvania, 2004–2010." The report, using a series of maps and data, purports to show that drilling has lead to "carving up" wildlife habitats in some forests.
USGS Report on the Impact of Marcellus Shale Drilling on Forest Animal Habitats
USGS Report on the Impact of Marcellus Shale Drilling on Forest Animal Habitats
Marcellus Drilling News
BsidesDelhi Security Automation for Red and Blue Teams
Bsides Delhi Security Automation for Red and Blue Teams
Bsides Delhi Security Automation for Red and Blue Teams
Suraj Pratap
This presentation guides students through the process of using the words although and despite to combine sentences.
Combining sentences with the words although and despite
Combining sentences with the words although and despite
Emily Kissner
Heterogenous Persistence - Percona Live - USA 2016
Heterogenous Persistence
Heterogenous Persistence
Jervin Real
Intro talk to kick off the Adaptive Content Show & Tell at #AustinContent.
Adaptive Content Show & Tell - Austin Content
Adaptive Content Show & Tell - Austin Content
cdelk
Performance Benchmarking of Clouds Evaluating OpenStack
Performance Benchmarking of Clouds Evaluating OpenStack
Performance Benchmarking of Clouds Evaluating OpenStack
Pradeep Kumar
We live in an era where the world is more connected than ever before and the trajectory is such that data relationships will only continue to increase with no signs of slowing down. Connected data is the key to your business succeeding and growing in today’s connected world. Leading enterprises will be the ones that utilize relationship-centric technologies to leverage connections from their internal operations and supply chain to their customer and user interactions. This ability to utilize connected data to understand all the nuanced relationships within their organization will propel them forward as they act on more holistic insights. Every organization needs a knowledge graph because connected data is an essential foundation to advancing business. Knowledge graphs provide: - Increased visibility between internal groups - Efficiency gains - Cross-functional data collaboration - Core complete and reliable business insights - Better customer engagement The live presentation and discussion can be found here: https://www.youtube.com/watch?v=RQGdw82rAes Additional reading on why connected data is beneficial: https://www.graphgrid.com/why-connected-data-is-more-useful/ Connected data solutions available by Benjamin and his team via GraphGrid and AtomRain: https://www.graphgrid.com and https://www.atomrain.com
Journey of The Connected Enterprise - Knowledge Graphs - Smart Data
Journey of The Connected Enterprise - Knowledge Graphs - Smart Data
Benjamin Nussbaum
Docker is quickly becoming an invaluable development and deployment tool for many organizations. Come and spend the day learning about what Docker is, how to use it, how to integrate it into your workflow, and build an environment that works for you and the rest of your team. This hands-on tutorial will give you the kick-start needed to start using Docker effectively.
Docker for PHP Developers - Madison PHP 2017
Docker for PHP Developers - Madison PHP 2017
Chris Tankersley
Tony Wilmer, Lead DevOps Pipeline Engineer at DigitalGlobe, gives his presentation on microservices at the DevOps Leadership Summit in Boston MA.
Using a Canary Microservice to Validate the Software Delivery Pipeline
Using a Canary Microservice to Validate the Software Delivery Pipeline
XebiaLabs
Selma_CV1
Selma_CV1
Selma Elsaeed
One of the key strengths of JVM is automatic memory management (Garbage Collection). Its understanding can help in writing better applications. This becomes all the more important as enterprise server applications have large amount of live heap data and significant parallel threads. Until recently, main collectors were parallel collector and concurrent-mark-sweep (CMS) collector. This presentation introduces the various Garbage Collectors and compares the CMS collector against its replacement, a new implementation in Java7 i.e. G1. It is characterized by a single contiguous heap which is split into same-sized regions. In fact if your application is still running on the 1.5 or 1.6 JVM, a compelling argument to upgrade to Java 7 is to leverage G1.
Java Garbage Collectors – Moving to Java7 Garbage First (G1) Collector
Java Garbage Collectors – Moving to Java7 Garbage First (G1) Collector
Gurpreet Sachdeva
This week we started a new section of Acts where Luke turns our attention away what was going on in the Temple courts to the inevitable challenges of exponential growth and diversity. We evaluated internal evidence that Luke was possibly using a new source(s) for this section including the introduction of previously unused terms which are common in his Gospel and throughout the rest of Acts. As the group of Christ followers experienced exponential growth, it was only a matter of time before logistical issues arose which could potentially derail the unity they were experiencing. We discussed the difference between "Hebrews" and "Hellenists" in this passage, comparing various translations to the original Greek, and we discussed how this distinction is evidence of a new source for our historian author.
Acts 6:1-7 ~ Organic Growth of the Early Church (pt. 1)
Acts 6:1-7 ~ Organic Growth of the Early Church (pt. 1)
Laura Zielke
The Complete Transformation from Offline to Online Magento Implementation of a B2B Platform – a Case Study. This case study shows how we managed to reach 100.000.000 EUR of online revenue, within only 3 quarters last year.
B2B Digital Transformation - Case Study
B2B Digital Transformation - Case Study
Divante
Erkekte, gebelikte, daha önce meme veya aksiller cerrahi uygulananlarda aksillaya yaklaşım
Doç. Dr. Mehmet Ali GÜLÇELİK
Doç. Dr. Mehmet Ali GÜLÇELİK
Mehmet Ali GÜLÇELİK
Everyone wants their little application to grow up to be a strong, well-rounded, and useful set of code. We organize, we unit test, we market research, and then we push to production. All is good in the world until now you need two web servers, and multiple back-end servers, and more DB servers than you have fingers. Your code starts to act weird, there are errors in some places but not others. Fires, floods, and locusts all start to appear, and how do you manage it? Let's look at some real-life examples, along with some tools and tips, for managing those fires as your application grows.
Failing at Scale - PNWPHP 2016
Failing at Scale - PNWPHP 2016
Chris Tankersley
Presented at the Chicago Riak Meetup, 20 Oct 2015. Slides walk through a demo of automating the building of a full stack Riak KV cluster from scratch, and then populating it with 250,000,000 time series data points.
Turnkey Riak KV Cluster
Turnkey Riak KV Cluster
Joe Olson
LeanIX ist ein Startup aus Bonn, dass eine Software-as-a-Service Lösung anbieter, mit der Unternehmen wie z.B. Zalando, Axel Springer, RWE oder Helvetia Versicherung ihre IT Landschaft dokumentieren. Dank eines modernen Green-Blue Deployments können Releases und Hotfixes im laufenden Betrieb ausgerollt werden, ohne dass die Nutzer des Systems davon beeinträchtigt werden. In diesem Talk beim Bonn Agile Meetup gibt Co-CEO André Einblick in die Konzepte und zugrundeliegenden Technologien wie Docker, Ansible und Jenkins. === LeanIX offers an innovative software-as-a-service solution for Enterprise Architecture Management (EAM), based either in a public cloud or the client’s data center. Companies like Adidas, Axel Springer, Helvetia, RWE, Trusted Shops and Zalando use LeanIX Enterprise Architecture Management tool. Free Trial: http://bit.ly/LeanIXFreeTrial
Continuous deployment in LeanIX @ Bonn Agile
Continuous deployment in LeanIX @ Bonn Agile
LeanIX GmbH
Andere mochten auch
(18)
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
Your data is in Prometheus, now what? (CurrencyFair Engineering Meetup, 2016)
USGS Report on the Impact of Marcellus Shale Drilling on Forest Animal Habitats
USGS Report on the Impact of Marcellus Shale Drilling on Forest Animal Habitats
Bsides Delhi Security Automation for Red and Blue Teams
Bsides Delhi Security Automation for Red and Blue Teams
Combining sentences with the words although and despite
Combining sentences with the words although and despite
Heterogenous Persistence
Heterogenous Persistence
Adaptive Content Show & Tell - Austin Content
Adaptive Content Show & Tell - Austin Content
Performance Benchmarking of Clouds Evaluating OpenStack
Performance Benchmarking of Clouds Evaluating OpenStack
Journey of The Connected Enterprise - Knowledge Graphs - Smart Data
Journey of The Connected Enterprise - Knowledge Graphs - Smart Data
Docker for PHP Developers - Madison PHP 2017
Docker for PHP Developers - Madison PHP 2017
Using a Canary Microservice to Validate the Software Delivery Pipeline
Using a Canary Microservice to Validate the Software Delivery Pipeline
Selma_CV1
Selma_CV1
Java Garbage Collectors – Moving to Java7 Garbage First (G1) Collector
Java Garbage Collectors – Moving to Java7 Garbage First (G1) Collector
Acts 6:1-7 ~ Organic Growth of the Early Church (pt. 1)
Acts 6:1-7 ~ Organic Growth of the Early Church (pt. 1)
B2B Digital Transformation - Case Study
B2B Digital Transformation - Case Study
Doç. Dr. Mehmet Ali GÜLÇELİK
Doç. Dr. Mehmet Ali GÜLÇELİK
Failing at Scale - PNWPHP 2016
Failing at Scale - PNWPHP 2016
Turnkey Riak KV Cluster
Turnkey Riak KV Cluster
Continuous deployment in LeanIX @ Bonn Agile
Continuous deployment in LeanIX @ Bonn Agile
Mehr von Cysinfo Cyber Security Community
Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K A
Cysinfo Cyber Security Community
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Cysinfo Cyber Security Community
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Cysinfo Cyber Security Community
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
Cysinfo Cyber Security Community
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
Cysinfo Cyber Security Community
Closer look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin Shenoi
Cysinfo Cyber Security Community
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Cysinfo Cyber Security Community
The Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil Mahendra
Cysinfo Cyber Security Community
Reversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by Monnappa
Cysinfo Cyber Security Community
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Cysinfo Cyber Security Community
Analysis of android apk using adhrit by Abhishek J.M
Analysis of android apk using adhrit by Abhishek J.M
Analysis of android apk using adhrit by Abhishek J.M
Cysinfo Cyber Security Community
Understanding evasive hollow process injection techniques by monnappa k a More info : https://cysinfo.com/10th-quarterly-meetup-29th-july-2017/
Understanding evasive hollow process injection techniques monnappa k a
Understanding evasive hollow process injection techniques monnappa k a
Cysinfo Cyber Security Community
Security challenges in d2d communication by ajithkumar vyasarao More info : https://cysinfo.com/10th-quarterly-meetup-29th-july-2017/
Security challenges in d2d communication by ajithkumar vyasarao
Security challenges in d2d communication by ajithkumar vyasarao
Cysinfo Cyber Security Community
S2 e (selective symbolic execution) by shivkrishna a More info : https://cysinfo.com/10th-quarterly-meetup-29th-july-2017/
S2 e (selective symbolic execution) -shivkrishna a
S2 e (selective symbolic execution) -shivkrishna a
Cysinfo Cyber Security Community
Dynamic binary analysis using angr siddharth muralee More info : https://cysinfo.com/10th-quarterly-meetup-29th-july-2017/
Dynamic binary analysis using angr siddharth muralee
Dynamic binary analysis using angr siddharth muralee
Cysinfo Cyber Security Community
Bit flipping attack on aes cbc - ashutosh ahelleya More info : https://cysinfo.com/10th-quarterly-meetup-29th-july-2017/
Bit flipping attack on aes cbc - ashutosh ahelleya
Bit flipping attack on aes cbc - ashutosh ahelleya
Cysinfo Cyber Security Community
Security Analytics using ELK stack
Security Analytics using ELK stack
Security Analytics using ELK stack
Cysinfo Cyber Security Community
Introduction to Binary Exploitation
Introduction to Binary Exploitation
Introduction to Binary Exploitation
Cysinfo Cyber Security Community
ATM Malware: Understanding the threat
ATM Malware: Understanding the threat
ATM Malware: Understanding the threat
Cysinfo Cyber Security Community
XXE - XML External Entity Attack
XXE - XML External Entity Attack
XXE - XML External Entity Attack
Cysinfo Cyber Security Community
Mehr von Cysinfo Cyber Security Community
(20)
Understanding Malware Persistence Techniques by Monnappa K A
Understanding Malware Persistence Techniques by Monnappa K A
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Understanding & analyzing obfuscated malicious web scripts by Vikram Kharvi
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Getting started with cybersecurity through CTFs by Shruti Dixit & Geethna TK
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
A look into the sanitizer family (ASAN & UBSAN) by Akul Pillai
Closer look at PHP Unserialization by Ashwin Shenoi
Closer look at PHP Unserialization by Ashwin Shenoi
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
Unicorn: The Ultimate CPU Emulator by Akshay Ajayan
The Art of Executing JavaScript by Akhil Mahendra
The Art of Executing JavaScript by Akhil Mahendra
Reversing and Decrypting Malware Communications by Monnappa
Reversing and Decrypting Malware Communications by Monnappa
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
DeViL - Detect Virtual Machine in Linux by Sreelakshmi
Analysis of android apk using adhrit by Abhishek J.M
Analysis of android apk using adhrit by Abhishek J.M
Understanding evasive hollow process injection techniques monnappa k a
Understanding evasive hollow process injection techniques monnappa k a
Security challenges in d2d communication by ajithkumar vyasarao
Security challenges in d2d communication by ajithkumar vyasarao
S2 e (selective symbolic execution) -shivkrishna a
S2 e (selective symbolic execution) -shivkrishna a
Dynamic binary analysis using angr siddharth muralee
Dynamic binary analysis using angr siddharth muralee
Bit flipping attack on aes cbc - ashutosh ahelleya
Bit flipping attack on aes cbc - ashutosh ahelleya
Security Analytics using ELK stack
Security Analytics using ELK stack
Introduction to Binary Exploitation
Introduction to Binary Exploitation
ATM Malware: Understanding the threat
ATM Malware: Understanding the threat
XXE - XML External Entity Attack
XXE - XML External Entity Attack
Jetzt herunterladen