🧪 Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Malware

Focus Area: 🦠 Malware Analysis
33
Total Entries
36
Contributors

Top Contributors

Aditya K Sood(3) Atul Alex(2) Abhimanyu Rawat(1) Aditya Gupta(1) Amrita C Iyer(1)

All Entries (33 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2025-03-14TalkInsomnihack The Art of Malware Smuggling (Unmasking SVG-Based Attack Techniques) Dhiraj Mishramalware
2024-11-06TalkBlackalps IDAT Loader: The Malware’s Camouflaged Weapon Niranjan Jayanandmalware
2024-04-19Tool demoBlackhat Malware clustering using unsupervised ML : CalMal Source Code Himanshu Anandmalware
2023-08-07TalkC0c0n Generative AI and Cyber Crimes Video Brijesh Singhmalwaresecurity-awarenessrisk-management+2
2022-08-25TalkHitb Sec Conf Building An Army Of Bots By Hijacking A Unicorn’s Twitter Handle Presentation Rahul Sasi, Vishal Singhsocial-engineeringpentestingmalware+2
2021-11-12TalkC0c0n Dissecting Malicious Software and Analysis Shrutirupa Banerjieemalwarereverse-engineeringdynamic-analysis+1
2021-11-11Tool demoBlackhat DejaVu ++ Source Code Bhadreshkumar Patel, Harish Ramadossmalwaredefense
2021-11-10Tool demoBlackhat RIoTPot: A Modular Hybrid-Interaction IoT/OT Honeypot Source Code Abhimanyu Rawat, Shreyas Srinivasamalwaredefense
2021-11-10Tool demoBlackhat Wireshark Forensics Toolkit Source Code Rishikesh Bhidemalwareforensic
2020-11-20TalkDeepsec What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Presentation Shyam Sundar Ramaswamimalware
2019-11-01TalkHackfest The Mechanics of Malware’s Darkside Presentation Video Yagnesh Waran Pmalware
2019-10-12TalkTexas Cyber Summit HX-3012 PErfidious: Make PE Backdooring Great Again! Shreyans Doshireverse-engineeringmalwarebinary-analysis+3
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishramalwarereverse-engineeringdynamic-analysis+2
2018-10-03Tool demoBlackhat Angad: A Malware Detection Framework Using Multi-Dimensional Visualization Presentation Source Code Ankur Tyagimalware
2016-10-27TalkBrucon Decepticon The Rise and Evolution of an Intelligent Evil Twin…!!! Video Rushikesh D Nandedkar, Amrita C Iyer, Krishnakant Patilmalwarereverse-engineering
2016-03-15TalkGroundzerosummit r00tKidz and Hacking Triveni Singhpentestingethical-hackingprivilege-escalation+3
2015-11-05TalkGround Zero Summit Browser based Malware attacks Harsh Daftarymalwareredteam
2015-11-05TalkGround Zero Summit Dissecting Android Malware Anto Josephmobileandroidmalware
2014-05-21TalkPhdays Android Exploitation Video Aditya Guptamobileandroidredteam+3
2013-10-19TalkToor Con Static Malware Analysis with PyTriage Yashin Mehaboobemalware
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumarmalwareandroidmobile+1
2012-11-23TalkMalcon Surprise paper! Atul Alexmalwarereverse-engineeringmobile-security
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawdewindows-phoneredteammalware
2012-08-03TalkC0c0n Cyber Weapons Sameer Saxenapentestingexploitationmalware+1
2012-07-14TalkHope Advancements in Botnet Attacks and Malware Distribution Video Aditya K Soodmalwarebotnetweb-security+2
2011-11-25TalkMalcon Advanced Malware for Apple Products Atul Alexmalwareredteammac-os+1
2011-11-25TalkMalcon Mareech : Look it’s a HID made up of gold Nikhil Mittalhidredteammalware
2011-11-17TalkDeepsec FakeAntiVirus - Journey from Trojan to a Persisent Threat Jagadeesh Chandraiahmalwaretrojanreverse-engineering+1
2011-05-19TalkHitb Sec Conf Spying on SpyEye – What Lies Beneath? Presentation Aditya K Soodmalwareblueteam
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakharlinuxmalwareredteam
2010-08-01TalkC0c0n Horses, Rats and Bots Jairam Rameshmalwarebotnetreverse-engineering+1
2010-02-25TalkNullcon Malware Detection Tool for Websites: A Proof-Of-Concept Presentation Anant Kochharmalwareblueteam
2009-11-18TalkSecuritybyte Rumbling Infections – Web Malware Ontology Presentation Aditya K Soodmalware