Presentations
- Automating Linux Malware Analysis using Limon Sandbox at Black Hat Europe 2015 : Video
- Inspecting Linux Malwares using Limon Sandbox at FIRST 28th Annual Conference : Link
- Limon – Sandbox for Analyzing Linux Malwares at Black Hat Asia 2016 : Link
- Reversing and Decipering Cyber Espionage Malware Communications at 4SICS/FIRST – Summit on SCADA/ICS cyber security : Video
- Advanced Threats and Analysis at DSCI Best Practices Meet 2016 : Link
- Advanced Threats,Case Studies and Analysis at National Cyber Defence Summit 2016 : Link
Tools
- Limon – Linux Sandbox : Link
- Linux mem diff Plugin (Volatility Plugin) : Link
- Gh0stRat Volatility Plugin (Volatility Plugin) : Link
- Hollowfind Volatility plugin (1st place in Volatility Plugin contest 2016) : Link
- Psinfo Volatility plugin : Link
Trainings
- Memory Forensics for Incident Responders at FIRST TC Amsterdam : Link
- Memory Forensics for Incident Responders at 4SICS-Scada/ICS Summit, Sweden : Link
- Memory Forensics Workshop at Amrita Centre for Cyber Security Systems & Networks : Link
Articles
- Analysis of Malicious Excel Spreadsheet in eForensics Magazine : Link
- Finding Advanced Malware Using Volatility in eForensics Magazine : Link
- Dissecting and Deciphering the Communications of Cyber Espionage Malware in eForensics Magazine : Link
- Hunting and Decrypting Communications of Gh0st RAT in Memory in [HACK]In[SIGHT] Magazine : Link
- Setting Up Your Own Malware Analysis Lab in Hakin9 Magazine : Link
- A Practical Approach To Malware Memory Forensics in eForensics Magazine : Link
- Extracting Forensic Artifacts Using Memory Forensics in eForensics Magazine : Link
- Malware Analysis in eForensics Magazine in eForensics Magazine: Link
- Extracting Forensic Artifacts Using Memory Forensics in eForensics Magazine : Link
- Advanced Malware Detection using Memory Forensics in Hakin9 Magazine : Link
- Setting Up Your Own Malware Analysis Lab in Hakin9 Magazine : Link
- A Practical Approach To Malware Memory Forensics in eForensics Magazine : Link
- Malware Analysis in Hakin9 Magazine : Link
- Automating Linux Malwares using Limon Sandbox in Digital 4n6 Journal
- Understanding Hollow Process Injection Using Reverse Engineering and Memory Forensics : Link
- Detecting Deceptive Process Hollowing Techniques Using HollowFind Volatility Plugin : Link
- Detecting Malicious Processes Using Psinfo Volatility Plugin : Link
- Malware Actors Using NIC Cyber Security Themed Spear Phishing to Target Indian Government Organizations : Link