Fingerprinting healthcare institutions by securityxploded873 views
Hollow Process Injection - Reversing and Investigating Malware Evasive Tactics by securityxploded3,559 views
Buffer Overflow Attacks by securityxploded596 views
Malicious Client Detection Using Machine Learning by securityxploded714 views
Understanding CryptoLocker (Ransomware) with a Case Study by securityxploded1,735 views
Linux Malware Analysis using Limon Sandbox by securityxploded3,351 views
Introduction to SMPC by securityxploded498 views
Breaking into hospitals by securityxploded843 views
Bluetooth [in]security by securityxploded1,767 views
Basic malware analysis by securityxploded3,097 views
Automating Malware Analysis by securityxploded1,221 views
Reverse Engineering Malware by securityxploded1,197 views
DLL Preloading Attack by securityxploded853 views
Partial Homomorphic Encryption by securityxploded2,224 views
Hunting Rootkit From the Dark Corners Of Memory by securityxploded2,839 views
Return Address – The Silver Bullet by securityxploded753 views
Defeating public exploit protections (EMET v5.2 and more) by securityxploded1,202 views
Exposing the secrets of Windows credential providerer by securityxploded2,128 views
Hunting Ghost RAT Using Memory Forensics by securityxploded2,414 views
Malicious Url Detection Using Machine Learning by securityxploded5,828 views