New: malware-analysisAll contenthive-129948hive-196917krzzanhive-183959hive-185836hive-180932hive-188619steemhive-150122photographyhive-166405hive-184714hive-101145hive-183397hive-144064uncommonlabhive-145157hive-193637bitcoinhive-103599hive-193186krsuccesshive-139150hive-113376TrendingNewHotLikerscristi (70)in science • 7 years agoMalware Analysis - Intro to RE - Lecture 2 [CS7038]This is the second lecture of the malware analysis course taught by Professor Coleman Kane. It's a one hour lecture comprising of the following topics: inspecting raw pdfs creating a python…cristi (70)in cybersecurity • 7 years agoHow Does Avast Perform with Ransomware - [TPSC Test]I talked in a previous post about my interest in active defense against malware. For that matter, I've been watching numerous reviews of different AV software and how they perform when the system is…cristi (70)in cybersecurity • 7 years agoDisassembling with IDA - Malware Analysis TutorialI'm not sure I've suggested this tutorial before, but here goes. So, for those who are into malware analysis, one of the tools in your repertoire is a disassembler. A very large majority of…cristi (70)in cybersecurity • 7 years agoHow to Set Up a Malware Analysis Lab - [OALabs]I know I was very confused the first time I created a virtual machine for malware analysis. My biggest concern was how to make sure that the samples I'm analyzing are not to escape the isolation…