SlideShare a Scribd company logo
1 of 37
Download to read offline
Clamdigging:	Leveraging	ClamAV
for	Malware	Analysis	and	
Detection
2017-05-12
BSides Denver
Signature	based	detection
• Dead,	right?
• No,	it’s	not	*totally*useless	
• Of	course,	not	enough	on	its	own
• Defense	in	depth
• sigh,	I	know..
• but	srsly
• Hunting!	Tracking!	Punching!
ClamAV
• Its	2017,	why	are	we	talking	about	ClamAV
• Developed	by	Sourcefire,	acquired	by	Cisco	in	2013
• Free,	open	source	(GPL)	anti	virus	solution	for	mail,	endpoint	and	on	
demand	scanning
• Linux	/	BSD
• OSX
• Windows	
• Target	filetypes /	structures
• Decompression	/	unrolling	of	filetypes
• UPX/NSPack,	ZIP/RAR/OLE,	LZMA,	etc
ClamAV 0.99+
• Yay,	good	reasons	to	use	it!
• Updated	functionality
• Decompression	/	unrolling	of	more	filetypes!
• PCRE!
• Yara functionality!
• Yara ->	ClamAV (with	some	exceptions)
• ClamAV decompression	/	unrolling	+	YARA	logic	==	win
• Expanded	sigtool functionality!
So..	why	ClamAV?
• Why	not?	I	just	gave	you	some	good	reasons
• It’s	free
• Some	MTAs	have	Clam	functionality	built	in
• Similar	functionality	to	Yara,	just	does	some	other	stuff	better
• Quick	triage	of	attachments	
• Evil	documents,	macros,	exploits,	etc.
• Detection	capabilities
• Track	threats	across	the	board
• Classify	threats
• Known	evil	doc	vs	known	evil	macro	inside	a	doc	vs	known	Flash	exploit
• Actor	tracking
• APTz,	Builders,	Gangs,	campaigns,	etc
Integration	for	Malware	Analysis
• Automated	analysis	with	Cuckoo	Sandbox
Integration	for	Malware	Analysis
• Pipe	into	your	favorite	tools	for	sorting	results
• Know	when	things	update	and	you	start	missing	detection
• EKs
• Track	the	use	of	known	dropped	exploits	(Flash,	Silverlight,	etc)
• Macros	/	Documents
• Track	Actors	/	Campaigns
• Hunting!
• Write	generic	sigs	to	detect	evil	conditions	and	start	to	hunt
ClamAV for	Malware	Analysis	
• Multiple	lures	/	payloads,	same	macros
ClamAV for	Malware	Analysis	
• Hancitor document	keyword
ClamAV for	Malware	Analysis	
• APT	maldoc detected	by	generic	XOR	exe	sig
ClamAV for	Malware	Analysis	
• Detecting	various	image	lures	embedded	in	docs
ClamAV for	Malware	Analysis	
• Determine	common	doc	social	engineering	lure	text
• Used	~1,000	malicious	docs
• Determined	common	strings	using	statistical	analysis
• Most	common:
• Document	created	in	earlier	version	of	Microsoft	Office	(Word|Excel)
• To	(view|decrypt|display)	this	(content|document),	please	click	"Enable	
Editing"	(form|from)	the	yellow	bar	and	then	click	"Enable	Content”
• To	properly	display	the	document,	please	Enable	Content.
• To	display	the	contents	of	the	document	click	on	Enable	Content	button.
ClamAV for	Malware	Analysis
ClamAV for	Malware	Analysis
• Detecting	JS	droppers/downloaders
ClamAV for	Malware	Analysis
• Malicious	PDF
ClamAV for	Malware	Analysis
• Embedded	objects	in	docs
ClamAV for	Malware	Analysis	
• CVE-2017-0199
ClamAV for	Analysts
• Run	locally,	using	command	line	scanner
• Dissect	raw	macros	within	documents
• How	does	*ClamAV*	see	things?
• What	if	you	don’t	want	to	beautify/deobfuscate the	macros?
• Built	in	tools
• sigtool
• clamscan
• External	tools
• oletools
• viper
• Cuckoo
• lots	more
clamscan
• Command	line	version	of	ClamAV
• $clamscan –d	rules.ldb attachment
• What	I	find	most	useful:
• --debug
• Provides	a	ton	of	useful	information	on	the	target	file
• Also	will	provide	information	when	a	file	is	scanned
• --info
• Provides	a	ton	of	useful	information	on	the	target	file
• --leave-temps
• Saves	temp	files	generated	during	analysis
• UPX	packed	file	->	saves	compressed	file
sigtool
• Swiss-army	knife	for	ClamAV
• What	I	find	most	useful	are:
• --vba
• Dumps	out	the	raw	macros	inside	of	a	document
• --html-normalise
• Creates	an	ascii output	html/js file	which	is	‘normalized’	for	how	ClamAV will	read	it
• Removes	case,	whitespaces,	et
• --decode-sigs
• Feeds	in	sigs	from	stdin and	decodes	the	signatures	contents
• --hex-dump
• Reads	in	from	stdin and	spits	out	hex	dump
sigtool
• $	sigtool --vba ‘evildoc.bin’	|	sigtool --hex-dump	|	less
sigtool
• $	cat	local-rules.ldb |	sigtool --decode
Detour:	Sound	Rule	Writing	Theory
• Know	what	you	want	to	detect:
• Super	specific	content,	ideally	only	one	version	of	something	(think	hash,	or	very	
specific	contents)
• Generic	signature
• Detects	a	specific	type	of	content,	but	with	some	wiggle	room	as	far	as	things	like	variable	
names,	or	domain	names
• Loose	/	Heuristical Signature
• Detects	abnormalities,	or	the	presence	of	something	in	particular
• Sometimes	INFO	level,	but	other	times	Jumping	off	point	to	hunt
• i.e this	APT	uses	this	specific	control	to	auto-run	macros	when	this	document	opens
• Ideally,	the	perfect	rule	will	be	loose	enough	to	allow	slight	changes,	but	
specific	enough	to	capture	the	right	amount	of	maliciousness	indicative	of	
that	specific	threat
ClamAV Signatures
• Have	you	used	YARA?	It’s	pretty	similar
• Various	types	of	ClamAV signatures,	not	limited	to,	but:
• hdb (hash	database)
• Hash	based	signatures– simple
• ldb (logical	database)
• Logical	signatures– getting	trickier	now
• Boolean	logic
• Regex
• Content	modifiers
• Other	stuff	I’m	not	getting	into	because	these	I	find	most	useful
hdb signatures
• 7d8d7e1b9b4e54a113769fae842cc279:48237:EnableMacroLureImg.9.170412
md5	hash file	size message
• sigtool	--md5	<file>
Suggestions	for	sound	signatures
• Naming
• MiscreantPunch.EvilMacro.MultiPSD
L.170425
• Content
• Utilize	conditional	features
• <,	>,	=,	|,	&	for	logical	expressions
• i,	a,	w,	|	for	contents
• *	,	??	(wild	card	bytes)
• !(hex),	negate	bytes
• {x-y}, byte	ranges
• Offsets
• 0:[hex],	etc
• PCREs!
• Anchor	appropriately	to	a	content	
(i,	s,	g,	etc)
• Use	the	appropriate	flags
• ldb logic
• Take	advantage	of
• <,>,=,|,&
• Target	type
• OLE	/	Flash	/	html/js /	etc
Target	Types
src:	github.com/vrtadmin/clamav-devel/blob/master/docs/signatures.pdf
ldb signatures
• MiscreantPunch.EvilMacro.VBDL.170404; Engine:81-255,Target:2; (0&1&2&3&4&(5|6)&7&8&9&10);
4174747269627574652056425f::i;55524c446f776e6c6f6164546f46696c65::i;5c50726f6772616d73::i;5c537
46172747570::i;2e657865::i;2e72756e::i;7368656c6c::i;68747470::i;7/x3a//[^x22x27]+.exeb/si;433a::
i;9/[^x22x27]+.exeb/si
Signature	name Engine	compatibility,	and	Target	type Logical	expression
Desired	contents	used	for	detection	
as	well	as	PCRE
0:	Attribute	VB_ 1:	URLDownloadToFile 2:	Programs
More	examples...
MiscreantPunch.EvilMacro.MultiPSDL.170501;Engine:81-
255,Target:2;(0&1&2&3&4&5&6);4174747269627574652056425f::i;54686973446f63756d656e742e426f6f6b6
d61726b732e436f756e74::i;55426f756e64::i;436872::i;5368656c6c::i;466f726d2e45646974::i;52656d20{3-
20}0d0a466f726d2e45646974??2e{3-20}203d2022220d0a456c73650d0a52656d20{3-
20}0d0a466f726d2e45646974??2e{3-20}203d2022??220d0a::i
MiscreantPunch.RTF.EvilRTF.CVE-2017-0199-Obfus;Engine:81-255,Target:0;(0);0:7b5c7274!(66)*
5c6f626a757064617465
MiscreantPunch.SWF.MultiEKFlashExploit.CommonConStruct.20170505;Engine:81-
255,Target:11;(0&1&2&3&4);d030{0-500}2404c6732a;fcff7f;fcffffff07;0/xd0x30.{0,300}(?P<var1>([xd4-
xd7]|x63.))x2e.(?:[xd0-xd3]|x62.){2}x46.{2}xa0x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)x2e.xa1x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)x24x04xc6x73x2a(?P=var1)x37(?:[xd4-xd7]|x63.)(?:[xd0-
xd3]|x62.)/s;0/xa0x73(?P<s1>([xd4-xd7]|x63.))(?:[xd0-xd3]|x62.)(?P<g1>([xd0-
xd3]|x62.))x3c(?P=g1)x2e.xa1x73x2a(?P=s1)x37(?:[xd4-xd7]|x63.)(?P=g1)x24x04xc6x73x2a/s
QAing your	Sigs
• It’s	important	to	test	signatures	before	either	deploying	to	prod	or	an	
analysis	environment
• Twofold:
• Checking	your	sigs	for:
• Misspellings
• Formatting
• Errors
• Test	sigs	against	evil	docs	and	benign	docs– ensure	what	is	supposed	to	
happen..	does
I	wrote	a	sig	and	it	didn’t	fire
• Getting	things	to	fire	on	first	go	isn’t	easy
• Probably	is	your	pcre
• Debug!
• --debug
• $	clamscan –d	<rule-file>.ldb <file>	--debug
• Spits	out	a	ton	of	information	with	regards	to	how	the	engine	inspected	the	
file,	what	it	found,	and	what	conditions	exist
• Useful	for	determining	why	a	sig	didn’t	fire	or	had	problems
clam-punch
• Owned	/	Created	by	the	rule	druid	himself,	Will	Metcalf
• Github repo	containing	buckets	and	shovels
• Several	rulesets	updated	p	much	daily
• MiscreantPunch099-Low.ldb
• miscreantpunch.hdb
• MiscreantPunch099-INFO-Low.ldb
• exexor99.ldb
• Clamdigger
• Signature	generation	tool
clamdigger.py
• Python	script	for	generating	ldb ClamAV signatures
• Does	the	heavy	lifting
• Converts	content	->	hex
• Logically	formats	it
• Appends	macro	auto*	stuff	(if	you	want)
• Add/remove	modifiers
Limitations
• Encrypted	docs
• Observed	in	recent	campaigns
• Use	some	tool	to	bruteforce (or	enter	if	known)	->	send	to	clam	for	processing
• EPS	Files	detected	as	PostScript	are	blanket	ignored
• Multimatch can	be	unreliable
Resources
• ClamAV Signature	Docs	(really	important!)
• github.com/vrtadmin/clamav-devel/blob/master/docs/signatures.pdf
• Miscreant	Punch	Sigs
• github.com/wmetcalf/clam-punch
• Tutorial	on	sigwriting I	made
• www.malwarefor.me/writing-signatures-for-clam-av-0-99-a-tutorial
• SaneSecurity 3rd party	Sigs
• sanesecurity.com/usage/signatures
• ClamAV Mailing	List
• lists.clamav.net/cgi-bin/mailman/listinfo/clamav-users
• Mal(?:doc|ware)	Samples
• malware-traffic-analysis.net
• hybrid-analysis.com
• malwr.com
come	hang	w	me	(trainings)
• OISF	Training– Denver,	CO:	June	20-21st
• Mix	of	Suricata User	training	with	a	kicker	of	signature	development
• DerbyCon 7.0 – Lousiville,	KY:	September	20-21st	
• Practical	Signature	Development	for	Open	Source	IDS
• TL;DR	how	to	write	Suricata/Snort	sigs	that	don’t	suck	J
• SuriCon 2017	– Prague,	CZ:	November	15-17th
• https://suricon.net/	
• CFP	open	(talk	to	me!)
• Sponsors	needed!	(support	Open	Source!)
Questions?
• don’t	tweet	me:	@malwareforme
• don’t	email	me:	jack@malwarefor.me
• tks wmetcalf
• tks jwilliams
• tks clamav
• tks Steve	B	/	SaneSecurity
• tks BSides Denver!

More Related Content

What's hot

The charitable endowments act 1890
The charitable endowments act 1890The charitable endowments act 1890
The charitable endowments act 1890Leo Lukose
 
Data Redundancy & Update Anomalies
Data Redundancy & Update AnomaliesData Redundancy & Update Anomalies
Data Redundancy & Update AnomaliesJens Patel
 
Lesson 1 System Analysis and Design
Lesson 1 System Analysis and DesignLesson 1 System Analysis and Design
Lesson 1 System Analysis and Designperly pantojan
 
System concepts, elements and types of systems ppt
System concepts, elements and types of systems pptSystem concepts, elements and types of systems ppt
System concepts, elements and types of systems pptShobhit Sharma
 
Principles social group work
Principles social group workPrinciples social group work
Principles social group workDr. SARAVANA K
 
Double level directory structure 55(1)
Double level directory structure 55(1)Double level directory structure 55(1)
Double level directory structure 55(1)myrajendra
 
GOOGLE FILE SYSTEM
GOOGLE FILE SYSTEMGOOGLE FILE SYSTEM
GOOGLE FILE SYSTEMJYoTHiSH o.s
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systemssommerville-videos
 
Systems Thinking: Applications to Space Systems
Systems Thinking:Applications to Space SystemsSystems Thinking:Applications to Space Systems
Systems Thinking: Applications to Space SystemsCaltech
 
TID Chapter 10 Introduction To Database
TID Chapter 10 Introduction To DatabaseTID Chapter 10 Introduction To Database
TID Chapter 10 Introduction To DatabaseWanBK Leo
 

What's hot (14)

The charitable endowments act 1890
The charitable endowments act 1890The charitable endowments act 1890
The charitable endowments act 1890
 
Data Redundancy & Update Anomalies
Data Redundancy & Update AnomaliesData Redundancy & Update Anomalies
Data Redundancy & Update Anomalies
 
Urdhav pundra and mudra
Urdhav pundra and mudraUrdhav pundra and mudra
Urdhav pundra and mudra
 
Mis introduction
Mis introductionMis introduction
Mis introduction
 
Lesson 1 System Analysis and Design
Lesson 1 System Analysis and DesignLesson 1 System Analysis and Design
Lesson 1 System Analysis and Design
 
System concepts, elements and types of systems ppt
System concepts, elements and types of systems pptSystem concepts, elements and types of systems ppt
System concepts, elements and types of systems ppt
 
Principles social group work
Principles social group workPrinciples social group work
Principles social group work
 
Introduction to mis
Introduction to misIntroduction to mis
Introduction to mis
 
Double level directory structure 55(1)
Double level directory structure 55(1)Double level directory structure 55(1)
Double level directory structure 55(1)
 
GOOGLE FILE SYSTEM
GOOGLE FILE SYSTEMGOOGLE FILE SYSTEM
GOOGLE FILE SYSTEM
 
Supervision in social work
Supervision in social workSupervision in social work
Supervision in social work
 
Introducing sociotechnical systems
Introducing sociotechnical systemsIntroducing sociotechnical systems
Introducing sociotechnical systems
 
Systems Thinking: Applications to Space Systems
Systems Thinking:Applications to Space SystemsSystems Thinking:Applications to Space Systems
Systems Thinking: Applications to Space Systems
 
TID Chapter 10 Introduction To Database
TID Chapter 10 Introduction To DatabaseTID Chapter 10 Introduction To Database
TID Chapter 10 Introduction To Database
 

Similar to Clamdigging: Leveraging ClamAV for Malware Analysis and Detection

Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMSafely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMJonathan Katz
 
Get Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMGet Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMJonathan Katz
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysisChong-Kuan Chen
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Responsepm123008
 
Free and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEFree and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEEllie Robinson
 
Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Oren Eini
 
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldSearch in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldAlex Moundalexis
 
Encryption in php
Encryption in phpEncryption in php
Encryption in phpsana mateen
 
Messaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkMessaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkTomas Doran
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authenticationMohammed Adam
 
Neo4 + Grails
Neo4 + GrailsNeo4 + Grails
Neo4 + Grailsstasimus
 
BinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopBinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopJason Trost
 
CNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksCNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksSam Bowne
 
Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Mike King
 

Similar to Clamdigging: Leveraging ClamAV for Malware Analysis and Detection (20)

Hash cat
Hash catHash cat
Hash cat
 
Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAMSafely Protect PostgreSQL Passwords - Tell Others to SCRAM
Safely Protect PostgreSQL Passwords - Tell Others to SCRAM
 
Get Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAMGet Your Insecure PostgreSQL Passwords to SCRAM
Get Your Insecure PostgreSQL Passwords to SCRAM
 
Why ruby and rails
Why ruby and railsWhy ruby and rails
Why ruby and rails
 
Automatic tool for static analysis
Automatic tool for static analysisAutomatic tool for static analysis
Automatic tool for static analysis
 
DNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and ResponseDNS in IR: Collection, Analysis and Response
DNS in IR: Collection, Analysis and Response
 
2021_TLSH_SOC_pub.pdf
2021_TLSH_SOC_pub.pdf2021_TLSH_SOC_pub.pdf
2021_TLSH_SOC_pub.pdf
 
rspamd-slides
rspamd-slidesrspamd-slides
rspamd-slides
 
Free and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSEFree and Open Source Workflow Tools at LSE
Free and Open Source Workflow Tools at LSE
 
Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)Know thy cost (or where performance problems lurk)
Know thy cost (or where performance problems lurk)
 
KeyValue Stores
KeyValue StoresKeyValue Stores
KeyValue Stores
 
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the FieldSearch in the Apache Hadoop Ecosystem: Thoughts from the Field
Search in the Apache Hadoop Ecosystem: Thoughts from the Field
 
Encryption in php
Encryption in phpEncryption in php
Encryption in php
 
Neo4J and Grails
Neo4J and GrailsNeo4J and Grails
Neo4J and Grails
 
Messaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkMessaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new framework
 
Breaking out of crypto authentication
Breaking out of crypto authenticationBreaking out of crypto authentication
Breaking out of crypto authentication
 
Neo4 + Grails
Neo4 + GrailsNeo4 + Grails
Neo4 + Grails
 
BinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in HadoopBinaryPig - Scalable Malware Analytics in Hadoop
BinaryPig - Scalable Malware Analytics in Hadoop
 
CNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password AttacksCNIT 124: Ch 9: Password Attacks
CNIT 124: Ch 9: Password Attacks
 
Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5Nashville analytics summit aug9 no sql mike king dell v1.5
Nashville analytics summit aug9 no sql mike king dell v1.5
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Clamdigging: Leveraging ClamAV for Malware Analysis and Detection