SlideShare
  • Home
  • Explore
  • Upload
  • Login
  • Signup
SlideShare
  • Home
  • Explore
  • Login
  • Signup
Profile-photo-securityxploded-96x96

securityxploded

Uploads
Favorites
  • Fingerprinting healthcare institutions by securityxploded
    873 views

  • Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics by securityxploded
    3,559 views

  • Buffer Overflow Attacks by securityxploded
    596 views

  • Malicious Client Detection Using Machine Learning by securityxploded
    714 views

  • Understanding CryptoLocker (Ransomware) with a Case Study by securityxploded
    1,735 views

  • Linux Malware Analysis using Limon Sandbox by securityxploded
    3,351 views

  • Introduction to SMPC by securityxploded
    498 views

  • Breaking into hospitals by securityxploded
    843 views

  • Bluetooth [in]security by securityxploded
    1,767 views

  • Basic malware analysis by securityxploded
    3,097 views

  • Automating Malware Analysis by securityxploded
    1,221 views

  • Reverse Engineering Malware by securityxploded
    1,197 views

  • DLL Preloading Attack by securityxploded
    853 views

  • Partial Homomorphic Encryption by securityxploded
    2,224 views

  • Hunting Rootkit From the Dark Corners Of Memory by securityxploded
    2,839 views

  • Return Address – The Silver Bullet by securityxploded
    753 views

  • Defeating public exploit protections (EMET v5.2 and more) by securityxploded
    1,202 views

  • Exposing the secrets of Windows credential providerer by securityxploded
    2,128 views

  • Hunting Ghost RAT Using Memory Forensics by securityxploded
    2,414 views

  • Malicious Url Detection Using Machine Learning by securityxploded
    5,828 views

More
  • About
  • Support
  • Terms
  • Privacy
  • Copyright

© 2021 SlideShare from Scribd
  • English
  • Español
  • Português
  • Français
  • Deutsch