#WebScene

#The biggest in small world

Bad-ware analyze tutorial

review of spam obfuscation technics

# review of spam obfuscation technics

Farm spam: Analysis of obfuscation techniques used in spam...

hacking H1N1 Loader

# hacking H1N1 Loader

hacking a H1N1 Loader malware (tut in french)...

Getting back on a zeus sample

# Getting back on a zeus sample

Getting back on a zeus malware used by a not very smart botmaster....

Exfiltrating intel from where spam come from

# Exfiltrating intel from where spam come from

Farm spam: analysis of where spam comes from....

unpacking radamant ransomware

# unpacking radamant ransomware

RtlDecompressBuffer...

Reversing a special citadel

# Reversing a special citadel

Back to a special sample of citadel that targets France....

How the protection of Citadel got cracked

# How the protection of Citadel got cracked

getting back on what's happened...

how to debug mbr ransomware

# how to debug mbr ransomware

cracking an mbr ransomware...

TDL4 Starts Using 0-Day Vulnerability

# TDL4 Starts Using 0-Day Vulnerability

The Evolution of TDL: Conquering x64 Eugene Rodionov, Malware Researcher Aleksandr Matrosov, Senior Malware Researcher ##...

Pearson Rootkits infiltration du noyau Windows

# Pearson Rootkits infiltration du noyau Windows

...

Adobe Flash Malware

# Adobe Flash Malware

Analysing of an Adobe Flash Malware by NCR...

The Art of Computer Virus Research and Defense

# The Art of Computer Virus Research and Defense

Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and~~most importan...

Malware Detection  Advances in Information Securit

# Malware Detection Advances in Information Securit

This book captures the state of the art research in the area of malicious code detection, prevention and mitigation. It contains...

Rootkits : Subverting the Windows Kernel

# Rootkits : Subverting the Windows Kernel

This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrator...

Malware: Fighting Malicious Code

# Malware: Fighting Malicious Code

This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mai...