Tags
malware
sandbox
malware analysis
information security
ransomware
safety system
safety
industrial
ics
triton
hacking
evasion techniques
cryptominers
rat
reverse engineering
threat
it security
encryption
shadow broker
security
wannacry
virus
reverse
forensic
dfir
windows
rootkit
debug
kernel
cuckoo
See more
Presentations
(8)Likes
(4)Fuzzing malware for fun & profit. Applying Coverage-Guided Fuzzing to Find Bugs in Modern Malware.
Maksim Shudrak
•
5 years ago
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machine Learning
Malachi Jones
•
6 years ago
Bug hunting through_reverse_engineering
arif
•
6 years ago
Reverse Engineering Malware: A look inside Operation Tovar
Lancope, Inc.
•
9 years ago
Tags
malware
sandbox
malware analysis
information security
ransomware
safety system
safety
industrial
ics
triton
hacking
evasion techniques
cryptominers
rat
reverse engineering
threat
it security
encryption
shadow broker
security
wannacry
virus
reverse
forensic
dfir
windows
rootkit
debug
kernel
cuckoo
See more