BSides Las Vegas – Malware Analysis – Red Team Edition
Hunting Process Injection by Windows API Calls
YouTube Channel
LockBit 3.0 Ransomware Analysis – Malware for Fun
Red Team – Supply Chain Edition
Understanding Follina (CVE-2022-30190) – Malware for Fun
Yashma Ransomware Builder Analysis – Malware for Fun
Ardamax Keylogger Part 3 – Malware for Fun
Ardamax Keylogger Part 2 (Dropper) – Malware for Fun
Ardamax Keylogger Part 1 (Overview) – Malware for Fun
DarkSide Ransomware Reverse Engineering
Malware Analysis – Unpacking ASPack Manually
Malware Analysis – Unpacking PECompact Manually
Malware Analysis – Unpacking UPX Manually
Malware Analysis – Mirai Botnet Huawei Exploit
Ursnif Banking Trojan Malware Analysis
Malware Analysis – Unpacking ZIP Packed Malware without Infecting your System
Security Research – YouTube
RDP Credentials Hijacking – Abusing KeyMgr.dll
Windows Defender Antivirus Bypass PoC
Malware Analysis Workshop – Dissecting the WannaCry Ransomware
Research Papers
FluBot – Android Malware Analysis
Agent Tesla Loader – Malware Analysis
Blogs
Vitallia Trojan Returns to the Castle – MalwareAnalysis.co
IntelĀ® Audio Driver Unquoted Service Path Vulnerability
Can Document Files Be Trusted?
MSI TrueColor Unquoted Service Path Vulnerability
Corona-virus-Map Malware Analysis
InstallCore Obfuscation Analysis