theseongsu / presentation
Presentation slides, blogs, and videos of my conference presentations.
☆25Updated 9 months ago
Related projects ⓘ
Alternatives and complementary repositories for presentation
- ☆22Updated 5 months ago
- Malware Analysis tools☆25Updated 2 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆59Updated last year
- ☆26Updated last week
- A small utility to deal with malware embedded hashes.☆48Updated last year
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated last year
- shared samples from #dailyphish and/or #apt tweets☆35Updated this week
- .NET deobfuscator and unpacker (with a control flow unflattener for DoubleZero added).☆28Updated 2 years ago
- Use YARA rules on Time Travel Debugging traces☆86Updated last year
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆98Updated last year
- ☆59Updated 2 years ago
- ☆58Updated 8 months ago
- ☆66Updated 11 months ago
- Reads and prints information from the website MalAPI.io☆19Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆42Updated last year
- General malware analysis stuff☆35Updated 2 months ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆62Updated last week
- How to retro theme your Ghidra☆28Updated 2 weeks ago
- ☆27Updated 3 months ago
- ☆30Updated last year
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆48Updated last year
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆49Updated last year
- A tool that automates regex generation for the x86 and x86-64 instruction sets☆62Updated 7 months ago
- This is a little plugin to copy disassembly in a way that is usable in YARA rules!☆32Updated last year
- Symantec EDR Internals☆25Updated 3 years ago
- ☆25Updated 3 weeks ago
- Powershell Linter☆46Updated last month
- Solutions to Flare-On 10 CTF☆13Updated last year
- Code for BH21 talk: "Generating YARA Rules by Classifying Malicious Byte Sequences"☆16Updated 3 years ago
- Writeups for CTF challenges☆30Updated last year