This document discusses Gh0st RAT, a remote access trojan used in targeted attacks. It provides an overview of Gh0st RAT's network communications and encryption scheme. It then describes three video demonstrations: 1) analyzing Gh0st RAT's network traffic patterns, 2) decrypting its communications, and 3) hunting Gh0st RAT using memory forensics. The document lists the author's credentials and contact information and provides references for further reading on Gh0st RAT and related malware.