|
Up
|
|
|
|
|
2007-06-16 - Minifilters for detection of Malware.pdf
|
|
|
|
|
2008-11-10 - Advanced Metamorphic Techniques in Computer Viruses.pdf
|
|
|
|
|
2009-06-28 - AVU (Anti Virus UNIX) Demonstration.tgz
|
|
|
|
|
2010-02-03 - Sequence Based Malware Detection.pdf
|
|
|
|
|
2015-03-17 - Kprobe instrumentation based kernel patching code.tgz
|
|
|
|
|
2017-01-22 - Anti-emulation trends in modern packers.pdf
|
|
|
|
|
2018-06-27 - Fixing ELF static binaries with ASLR RELRO support.pdf
|
|
|
|
|
2018-09-12- Office VBA - AMSI Parting the veil on malicious macros.pdf
|
|
|
|
|
2018-09-27 - Out of sight but not invisible - Defeating fileless malware with behavior monitoring AMSI and next-gen .pdf
|
|
|
|
|
2018-11-18 - Preventing Ransomware Attacks Through File System Filter Drivers.pdf
|
|
|
|
|
2019-11-12 - Threat Hunting In Calltrace.pdf
|
|
|
|
|
2021-01-05 - Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers.pdf
|
|
|
|
|
2021-01-27 - Analysis of Antivirus Quarantine Files.pdf
|
|
|
|
|
2021-01-29 - Hunting in the Sysmon Call Trace.pdf
|
|
|
|
|
2021-02-10 - Detecting Manual Syscalls from User Mode.pdf
|
|
|
|
|
2021-05-24 - Hunting for Suspicious Usage of Background Intelligent.pdf
|
|
|
|
|
2021-07-09 - An Empirical Assessment of Endpoint Detection and Response Systems against Advanced Persistent Threats Attack Vectors.pdf
|
|
|
|
|
2021-08-23 - An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors.pdf
|
|
|
|
|
2021-11-14 - Instrumentation Callbacks - Detecting SYSCALLs.zip
|
|
|
|
|
2021-12-26 - Gatekeeping SysCalls.pdf
|
|
|
|
|
2022-01-11 - An Empirical Assessment of Endpoint Security Systems Against Advanced Persistent Threats Attack Vectors v3 FINAL.pdf
|
|
|
|
|
2022-02-02 - Elastic Security - Sandboxing Antimalware Products.pdf
|
|
|
|
|
2022-02-22 - Writing a C Yara Agent.pdf
|
|
|
|
|
2022-03-15 - Anti-UPX Unpacking Technique.pdf
|
|
|
|
|
2022-04-29 - Maelstrom EDR Kernel Callbacks Hooks and Call Stacks.pdf
|
|
|
|
|
2022-06-30 - Using process creation properties to catch evasion techniques.pdf
|
|
|
|
|
2022-07-10 - Patriot - Detecting various kinds of in-memory stealth techniques .zip
|
|
|
|
|
2023-02-10 - Forensic Log-Based Detection of Keystroke Injection BadUSB Attacks.pdf
|
|
|
|
|
2023-04-19 - Demonstrating monitoring abnormal syscalls with ETW.zip
|
|
|
|
|
2023-04-27 - The Art of Clipboard Forensics Recovering Deleted Data.pdf
|
|
|
|
|
2023-05-21 - PCAPeek - PoC reassembler for reverse VNC traffic.zip
|
|
|
|
|
2023-05-23 - Dynamic Detection and Classification of Persistence Techniques in Windows malware.pdf
|
|
|
|
|
2023-07-15 - Unveiling Secrets in Binaries using Code Detection Strategies.7z
|
|
|
|
|
2023-08-02 - Using Call Frequency to Identify API Functions.7z
|
|
|
|
|
2023-10-06 - Reflective call stack detections and evasions.pdf
|
|
|
|
|
2023-10-10 - A Hitch-hackers Guide to DACL-Based Detections - Part 1.pdf
|
|
|
|
|
2023-10-12 - A Hitch-hackers Guide to DACL-Based Detections - Part 2.pdf
|
|
|
|
|
2023-10-17 - A Hitch-hackers Guide to DACL-Based Detections - Part 3.pdf
|
|
|
|
|
2023-12-01 - Defeating Ransomware Through Vulnerability Exploitation.pdf
|
|
|
|
|
2023-12-04 - Defeating Ransomware Thru Vulnerability Exploitation .pdf
|
|
|
|
|
2024-03-31 - KasperskyHook - Hooking system calls using Kaspersky hypervisor.zip
|
|
|
|
|
2024-09-14 - Ballin' on a budget A Quick Guide to Defining Malware with $0, Python3, and Windows.pdf
|
|
|
|