Cyber Threat Intelligence (CTI): Finding C2 Servers, Malware and Botnets
Building a Honeypot to Capture Zero-day Malware, Part 2
Reverse Engineering Malware: Getting Started with Ghidra, Part 1
SCADA Hacking: Anatomy of a SCADA Malware, BlackEnergy 3 Attack on the Ukraine Grid
Reverse Engineering Malware: Reversing and Disassembly Tools
Reverse Engineering Malware, Part 5: OllyDbg Basics
Reverse Engineering Malware, Ghidra Part 3: Analyzing the WannaCry Ransomware
Reverse Engineering Malware, Part 1: Getting Started
SCADA Hacking: The Triton Malware Threat to SCADA/ICS Infrastructure
Web App Hacking: BurpSuite, Part 2: Bypass Weak Input Validation to Upload Malware to a Website
Reverse Engineering Malware: Getting Started with Ghidra, Part 2
Reverse Engineering Malware, Part 2: Assembler Language Basics
Reverse Engineering Malware, Part 6: System Level or Behavioral Analysis
Reverse Engineering Malware: Why YOU Should Study Reverse Engineering Malware
Reverse Engineering Malware, Part 4: Windows Internals
Reverse Engineering Malware, Part 3: IDA Pro Introduction
Vault7 Reveals that Even the CIA Reverse Engineers Malware to Re-Use Code