theseongsu / presentationLinks
Presentation slides, blogs, and videos of my conference presentations.
☆26Updated last year
Alternatives and similar repositories for presentation
Users that are interested in presentation are comparing it to the libraries listed below
Sorting:
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 3 months ago
- ☆38Updated 6 months ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- shared samples from #dailyphish and/or #apt tweets☆41Updated 2 weeks ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆85Updated last week
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆116Updated 6 months ago
- ☆22Updated last year
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 9 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 8 months ago
- IDA Python scripts☆41Updated 5 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆61Updated 2 years ago
- Malware Analysis tools☆26Updated last year
- ☆113Updated 2 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆128Updated last year
- ☆74Updated last year
- ☆29Updated 7 months ago
- ☆83Updated last month
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated last week
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆83Updated 2 years ago
- An automation plugin for Tiny-Tracer framework to trace and watch functions directly out of the executable's import table or trace logs (…☆119Updated last year
- ☆38Updated 9 months ago
- IDA Pro plugin for recognizing known hashes of API function names☆81Updated 3 years ago
- ☆53Updated 11 months ago
- Leveraging patch diffing to discover new vulnerabilities☆134Updated 11 months ago
- Leveraging CVEs as North Stars in vulnerability discovery and comprehension.☆70Updated last year
- ☆74Updated last year
- Use YARA rules on Time Travel Debugging traces☆92Updated 2 years ago
- General malware analysis stuff☆37Updated last year
- A C++ tool for process memory scanning & suspicious telemetry generation that attempts to detect a number of malicious techniques used by…☆84Updated last year
- Solutions to Flare-On 10 CTF☆13Updated last year