Menu

Close
  • Home
  • Resources
  • Linux Commands
Subscribe
Menu

Malware Analysis

A 2-post collection

Page 1 of 1

Reverse Engineering - Understanding Code Obfuscation

This post reflects my interest in malware analysis techniques - it should be considered a "work in progress" rather than a full blown tutorial or walkthrough, »

Chris Young Chris Young on Reverse Engineering, Malware Analysis 08 March 2021

OWASP Newcastle Webinar - 5th May 2020

Earlier this year I did an internal presentation to my colleagues at Pentest Ltd on the topic of Malware Analysis and Intelligence Recon. The presentation was »

Chris Young Chris Young on OWASP, Malware Analysis, Threat Intelligence, URLHaus 07 May 2020
Page 1 of 1
Information Security Consultant | Pen tester © 2022
Proudly published with Ghost