Presentations

  1. Automating Linux Malware Analysis using Limon Sandbox at Black Hat Europe 2015 : Video
  2. Inspecting Linux Malwares using Limon Sandbox at FIRST 28th Annual Conference : Link
  3. Limon – Sandbox for Analyzing Linux Malwares at Black Hat Asia 2016 : Link
  4. Reversing and Decipering Cyber Espionage Malware Communications at 4SICS/FIRST – Summit on SCADA/ICS cyber security : Video
  5. Advanced Threats and Analysis at DSCI Best Practices Meet 2016 : Link
  6. Advanced Threats,Case Studies and Analysis at National Cyber Defence Summit 2016 : Link

Tools

  1. Limon – Linux Sandbox : Link
  2. Linux mem diff Plugin (Volatility Plugin) : Link
  3. Gh0stRat Volatility Plugin (Volatility Plugin) : Link
  4. Hollowfind Volatility plugin (1st place in Volatility Plugin contest 2016) : Link
  5. Psinfo Volatility plugin : Link

Trainings

  1. Memory Forensics for Incident Responders at FIRST TC Amsterdam : Link
  2. Memory Forensics for Incident Responders at 4SICS-Scada/ICS Summit, Sweden : Link
  3. Memory Forensics Workshop at Amrita Centre for Cyber Security Systems & Networks : Link

Articles

  1. Analysis of Malicious Excel Spreadsheet in eForensics Magazine : Link
  2. Finding Advanced Malware Using Volatility in eForensics Magazine  : Link
  3. Dissecting and Deciphering the Communications of Cyber Espionage Malware in eForensics Magazine  : Link
  4. Hunting and Decrypting Communications of Gh0st RAT in Memory in [HACK]In[SIGHT] Magazine : Link
  5. Setting Up Your Own Malware Analysis Lab in Hakin9 Magazine : Link
  6. A Practical Approach To Malware Memory Forensics in eForensics Magazine  : Link
  7. Extracting Forensic Artifacts Using Memory Forensics in eForensics Magazine : Link
  8. Malware Analysis in eForensics Magazine in eForensics Magazine: Link
  9. Extracting Forensic Artifacts Using Memory Forensics in eForensics Magazine : Link
  10. Advanced Malware Detection using Memory Forensics in Hakin9 Magazine : Link
  11. Setting Up Your Own Malware Analysis Lab in Hakin9 Magazine : Link
  12. A Practical Approach To Malware Memory Forensics in eForensics Magazine : Link
  13. Malware Analysis in Hakin9 Magazine : Link
  14. Automating Linux Malwares using Limon Sandbox in Digital 4n6 Journal
  15. Understanding Hollow Process Injection Using Reverse Engineering and Memory Forensics : Link
  16. Detecting Deceptive Process Hollowing Techniques Using HollowFind Volatility Plugin : Link
  17. Detecting Malicious Processes Using Psinfo Volatility Plugin : Link
  18. Malware Actors Using NIC Cyber Security Themed Spear Phishing to Target Indian Government Organizations : Link