Reversing and Malware Analysis
Technology
Reversing & malware analysis training part 10 exploit development basics
Reversing and decrypting communications of apt malware
The Threat of Evasive Malware - Cloud Distribution · The Threat of Evasive Malware Lastline Labs ... Lastline relies on system emulation. With a system emulator, we gain the advantages
Documents
Reversing & Malware Analysis Training Part 9 - Advanced Malware Analysis
Reversing & malware analysis training part 8 malware memory forensics
Reversing & malware analysis training part 7 unpacking upx
Reversing and Decrypting the Communications of APT Malware (Etumbot)
Webinar: Stopping evasive malware - how a cloud sandbox array works
Internet
Detecting Evasive Malware in Sandbox
Reversing & malware analysis training part 4 assembly programming basics
Reversing malware analysis training part3 windows pefile formatbasics
Reversing & Malware Analysis Training Part 11 - Exploit Development [Advanced]
Reversing malware analysis training part11 exploit development advanced
Evasive Techniques: An IntroductionAT]minerva-labs.com 5 The Sum of All (Malware) Fears Classifying Malware's Phobias In order to better understand the usage of evasive techniques
Reversing malware analysis training part2 introduction to windows internals
Full-System Emulation Achieving Successful Automated Dynamic Analysis of Evasive Malware — Christopher Kruegel at Black Hat 2014
Software
Reversing malware analysis training part5 reverse engineering tools basics