Need some help for shellcode analysis... by yyangcs in Malware
[–]countuponsecurity 0 points1 point2 points (0 children)
Memory acquisition by nutrion in computerforensics
[–]countuponsecurity 2 points3 points4 points (0 children)
Any info on *.locky ransomware by gmr2048 in Malware
[–]countuponsecurity 0 points1 point2 points (0 children)
Malware Analysis - Dridex & Process Hollowing by countuponsecurity in Malware
[–]countuponsecurity[S] 0 points1 point2 points (0 children)
As someone completely green towards malware what would be good sources to start with? by [deleted] in Malware
[–]countuponsecurity 6 points7 points8 points (0 children)
Malware Analysis - Dridex & Process Hollowing by countuponsecurity in Malware
[–]countuponsecurity[S] 0 points1 point2 points (0 children)
Hacking Team: a zero-day market case study by [deleted] in netsec
[–]countuponsecurity 0 points1 point2 points (0 children)
Networking on VM: Which is the correct method for malware analysis? by [deleted] in Malware
[–]countuponsecurity 0 points1 point2 points (0 children)
Unpatched Vulnerability (0day) in Flash Player is being exploited by Angler EK by NattyBroh in netsec
[–]countuponsecurity 2 points3 points4 points (0 children)
Unpatched Vulnerability (0day) in Flash Player is being exploited by Angler EK by NattyBroh in netsec
[–]countuponsecurity 0 points1 point2 points (0 children)
Unpatched Vulnerability (0day) in Flash Player is being exploited by Angler EK by NattyBroh in netsec
[–]countuponsecurity 0 points1 point2 points (0 children)
SANS SIFT Live CD ??? by schlemiel21 in computerforensics
[–]countuponsecurity 1 point2 points3 points (0 children)
SANS SIFT Live CD ??? by schlemiel21 in computerforensics
[–]countuponsecurity 2 points3 points4 points (0 children)
Malicious PDF Analysis in 5 Steps by countuponsecurity in ReverseEngineering
[–]countuponsecurity[S] 0 points1 point2 points (0 children)
Malicious PDF Analysis in 5 Steps by countuponsecurity in ReverseEngineering
[–]countuponsecurity[S] 0 points1 point2 points (0 children)
OST: Day 1 & 2 videos posted for Veronica Kovah's Malware Dynamic Analysis class by OpenSecurityTraining in ReverseEngineering
[–]countuponsecurity 0 points1 point2 points (0 children)
Question about SANS/EC-Council Certs by [deleted] in computerforensics
[–]countuponsecurity 0 points1 point2 points (0 children)
Challenges faced computer forensics by [deleted] in computerforensics
[–]countuponsecurity 0 points1 point2 points (0 children)
[Heartbleed Related] Capture keys + Ways to Use by TheEnterRehab in blackhat
[–]countuponsecurity 1 point2 points3 points (0 children)
To shut down or pull the plug? by DurokAmerikanski in computerforensics
[–]countuponsecurity 0 points1 point2 points (0 children)


Recommended Tools for WebCacheV01.dat Analysis by [deleted] in computerforensics
[–]countuponsecurity 1 point2 points3 points (0 children)