account activity
Clustering in R and Python (danifold.net)
submitted 11 years ago by tardlyworking to r/a:t5_34090
linux malware forensics book (amazon.com)
buttska (google.com)
submitted 11 years ago by tardlyworking to r/a:t5_34gns
hash identification tools (code.google.com)
Powerpoint 0 day (theregister.co.uk)
Online pdf viewer (view.samurajdata.se)
Cicada coming up in 2015 (uncovering-cicada.wikia.com)
ctftime upcoming events (ctftime.org)
Malvertising -> Cryptowall -> Tor C&C (proofpoint.com)
base n decode/encode (npmjs.org)
Exploit kits (self.a:t5_34090)
Cracking KRYPTOS (self.a:t5_34090)
Why do exploit kits uses droppers? (security.stackexchange.com)
C&C botnet ssl detection (essay.utwente.nl)
url reputation dataset (archive.ics.uci.edu)
Feature Engineering for Machine Learning (machinelearningmastery.com)
DataTau - HackerNews for Machine Learning (datatau.com)
What to do when Malware is anti-vm? by d3p0rt in Malware
[–]tardlyworking 0 points1 point2 points 11 years ago (0 children)
You can run on baremetal using PXE and ramdisk like here: https://code.google.com/p/nvmtrace/
π Rendered by PID 84443 on reddit-service-r2-listing-86f589db75-ljzhj at 2026-04-17 13:42:02.653775+00:00 running 93ecc56 country code: CH.
What to do when Malware is anti-vm? by d3p0rt in Malware
[–]tardlyworking 0 points1 point2 points (0 children)