Skip to main content

Reversing Training Session Part 12 – Roo

Reversing Training Session Part 12 – Rootkit Analysis

Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) where Monnappa has delivered one of the best session of our entire series on ‘Rootkit Analysis’. This is part of our ongoing FREE ‘Reversing & Malware Analysis Training’ started since our Jan 2012. Monnappa delivered splendid session today. In this session, he talked […]

Book of the Month – Malware Analyst’s Co

Book of the Month – Malware Analyst’s Cookbook

“Malware Analyst’s Cookbook” is the latest master piece in the Malware Analysis field which covers almost all facets of the subject from all possible angles. I haven’t seen any book like this which covers everything that Malware Analyist will ever need starting from basics to advanced analysis. . . Here is the core information about […]

Released SpyDllRemover Mega Version v4.0

Released SpyDllRemover Mega Version v4.0

SpyDllRemover is the specialized tool for detecting spyware & hidden Rootkit Dlls in the System. It can also detect & remove user-land Rootkit processes as well as other spyware processes using multiple [user-land] Rootkit detection algorithms coupled with in-house Process heuristics. This makes it a generic tool for detecting & removing any known as well […]

Update on Upcoming Release of SpyDLLRemo...

Update on Upcoming Release of SpyDLLRemover & StreamArmor

We have been busy working on lot of things amid of next major release of SpyDLLRemover as mentioned in previous posts. We also planned for minor update on StreamArmor. Here is the brief update on each of these tools. SpyDllRemover 4.0 We were right on schedule for last week mega release of SpyDllRemover but due […]

Book of the Month – Cyber Fraud: Tactics

Book of the Month – Cyber Fraud: Tactics, Techniques and Procedures

Gone are the days when those BlackHat Hackers would tickle you for fun, Now they will poke you & take your diamonds without you even knowing anything about it until it’s too late. Landscape in the Cyber underground has completely changed since then, making it more like well organized business controlled by global entities around […]