πŸ§ͺ Experimental Feature

Tag-based content organization is an experimental feature. This page and its functionality may change as we refine the tagging system.

Tag: Malware Research

Focus Area: 🦠 Malware Analysis
30
Total Entries
28
Contributors

Top Contributors

Monnappa K A(4) Aditya K Sood(3) Parmanand Mishra(2) Shantanu Gawde(2) Abhishek Singh(1)

All Entries (30 total, sorted by date)

DateTypeConferenceTitleSpeaker(s)Tags
2024-08-07Tool demoBlackhat DarkWidow: Dropper/PostExploitation Tool targeting Windows Source Code Soumyanil Biswas, Chirag Savla#red-teaming#malware-research#post-exploitation+2
2023-08-06TalkC0c0n Dark web for investigations Amit Lokhande#threat-hunting#digital-forensics#network-forensics+3
2022-09-24TalkC0c0n Cryptocurrency Forensics Bhushan Gulabrao Borase#forensics#digital-forensics#cryptocurrency+1
2020-11-20TalkDeepsec What’s Up Doc? - Self Learning Sandboxes to Defeat Modern Malwares Using RSA: Rapid Static Analysis Presentation Shyam Sundar Ramaswami#malware-detection#sandbox#static-analysis+1
2020-03-06Tool demoNullcon FRISPY Source Code Tejas Girme, Parmanand Mishra#spyware#red-teaming#api-security+3
2018-10-15TalkHacklu Come to the dark side! We have radical insurance groups & ransomware Video Ankit Gangwal, Eireann Leverett#ransomware#risk-management#cyber-insurance+2
2018-10-05TalkC0c0n SCANDA: To Unbosom Malware Behavior Rajesh Nikam, Parmanand Mishra#reverse-engineering#dynamic-analysis#malware-research+1
2018-07-21TalkHope Evidential Study of IoT Botnets - The Bad and The Ugly! Video Aditya K Sood#botnet#iot-security-testing#malware-research
2017-08-18TalkC0c0n Anti-Virus Bypassing for Fun and Profit Vanshit Malhotra#red-teaming#malware-research#bypassing+2
2017-08-18TalkC0c0n Yarafying Android Malware: A Missing Step Before Malware Analysis Shivang Desai#android#blueteam#android-security+3
2017-03-31TalkBlackhat WHAT MALWARE AUTHORS DON’T WANT YOU TO KNOW - EVASIVE HOLLOW PROCESS INJECTION Presentation Whitepaper Video Monnappa K A#code-injection#red-teaming#malware-research+4
2015-11-13TalkBlackhat AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX Presentation Whitepaper Source Code Video Monnappa K A#linux#security-assessment#malware-research+4
2015-11-05TalkGroundzerosummit Dissecting Android Malware Anto Joseph#android#application-pentesting#dynamic-analysis+3
2015-08-06TalkBlackhat Harnessing Intelligence from Malware Repositories Presentation Video Arun Lakhotia, Vivek Notani#blueteam#security-analytics#malware-research+2
2015-08-01TalkC0c0n Reversing and Deciphering the Cyber Espionage Malware Communications Monnappa K A#reverse-engineering#decipher#malware-research+3
2015-02-06TalkNullcon Hunting and Decrypting Ghost communications using Memory Forensics Presentation Monnappa K A#forensics#blueteam#memory-forensics+2
2013-11-07TalkGroundzerosummit Malware for Firefox Mobile OS Shantanu Gawde#mobile-malware#malware-detection#malware-research+2
2013-11-07TalkGroundzerosummit Understanding the anatomy of advanced targeted attacks – The Trend Micro approach Tarun Gupta#forensics#malware-research#attack-surface
2013-10-19TalkToorcon Static Malware Analysis with PyTriage Presentation Yashin Mehaboobe#malware-detection#static-analysis#malware-research+1
2013-08-01TalkBlackhat Hot knives through butter: Bypassing automated analysis systems Presentation Whitepaper Video Abhishek Singh, Zheng Bu#red-teaming#dynamic-analysis#malware-research+1
2013-03-22TalkInsomnihack Guns and Smoke to fight Mobile Malware Ruchna Nigam#android-security#malware-research#reverse-engineering+2
2012-11-23TalkMalcon Advanced Malware Engine Whitepaper Mohit Kumar#android#red-teaming#malware-research+3
2012-11-23TalkMalcon Windows Phone 8 Malware Prototype Shantanu Gawde#windows-phone#red-teaming#mobile-device-management+3
2011-11-25TalkMalcon Exploit the Exploit kits Dhruv Soi#blueteam#exploit-kit#malware-detection+3
2011-10-07TalkC0c0n Automated Malware Analysis - Setting up the Environment Presentation K v Prashant, Pushkar Pashupat#security-assessment#dynamic-analysis#malware-research+1
2011-10-07TalkVirusbulletin Browser exploit packs - exploitation paradigm Presentation Whitepaper Aditya K Sood, Richard J Enbody#exploit-kit#malware-research#browser-security+1
2011-02-25TalkNullcon Jugaad Beta: Linux Thread Injection malware PoC Source Code Aseem Jakhar#linux#red-teaming#malware-research+2
2010-08-01TalkC0c0n Dangers and dynamic Malware analysis Chandrasekar#forensics#dynamic-analysis#malware-detection+4
2009-11-18TalkSecuritybyte Rumbling Infections – Web Malware Ontology Presentation Aditya K Sood#dynamic-analysis#malware-research#sandbox+2
2007-12-09TalkClubhack Analysis of Adversarial Code: The Role of Malware Kits! Presentation Rahul Mohandas#red-teaming#malware-research#dynamic-analysis+1