Consists of :
Code:
FILE 2007_28C3_Effective_DoS_on_web_application_platforms.pdf
FILE 3755.Microsoft Study into b70.pdf
FILE A Case Study on the Asprox Botnet SQL Infection Dynamics.pdf
FILE A Comparitive Analysis of Rootkit Detection Techniques.pdf
FILE A Multifaceted Approach to Understanding the Botnet Phenomenon.pdf
FILE a_museum_of_api_obfuscation_on_win32.pdf
FILE Abusing Forced Inline in C _ Development & Security.htm
FILE Abusing Forced Inline Part 2 Breakpoints _ Development & Security.htm
FILE Advanced Persistent Threats.pdf
FILE advancedApproachToDllInjectionAndHooking.pdf
FILE An Advanced Hybrid Peer-to-Peer Botnet.pdf
FILE An Analysis of Conficker C.html
FILE An Analysis of Conficker.htm
FILE Analysis_W32.Virut_.ce_.pdf
FILE Analysis-of-TR.Spy_.SpyEye.pdf
FILE an-overview-of-rustock.html
FILE Anti-Debugging A Developer's View.pdf
FILE anti-emulation through time-lock puzzles.pdf
FILE anti-vm anti-emulation.pdf
FILE AusCERT_2011_Andreas_Baumhof_V2.pdf
FILE auscert2009-confickersinkhole.pdf
FILE BH_US_08_Stewart_Protocols_of_the_Storm.pdf
FILE BlackEnergy+DDoS+Bot+Analysis.pdf
FILE blackhat2012-paper.pdf
FILE blackhat2012-presentation.pdf
FILE blackhole_paper_mar2012.pdf
FILE Camouflage in Malware.pdf
FILE Carberp - A Modular Information Stealing Trojan.pdf
FILE Carberp and Ring 0 (+ blackhole).pdf
FILE Carberp_Analysis (Trusteer).pdf
FILE clash-titans-zeus-spyeye_33393.pdf
FILE Combating Threats - W32 Sality.pdf
FILE common substring analysis.pdf
FILE Conficker_Working_Group_Lessons_Learned_17_June_2010_final.pdf
FILE conficker-analysis.pdf
FILE contextcarberp.htm
FILE ContextCarberpAnalysis.htm
FILE COSIC_Srizbi.pdf
FILE costofspam.pdf
FILE cutwail-LEET11.pdf
FILE decrypting-carberp-c-communication.html
FILE defeating rop.pdf
FILE entropy_analysis_encrypted_packed_malware.pdf
FILE ESET_win32georbot_analysis_final.pdf
FILE evasion and detection of metamorphic viruses.pdf
FILE EventPairsHandle.pdf
FILE FASTFLUX.HTM
FILE flame.pdf
FILE hc128_p3.pdf
FILE Heaven'sGate.html
FILE Hodprot-Report.pdf
FILE how-to-defeat-koobface.html
FILE HS-P005_ReflectiveDllInjection.pdf
FILE hydraq_final_231538.pdf
FILE iwm-koobface.pdf
FILE kasperskyOnRustock.htm
FILE KelihosAnalysis.htm
FILE killing-the-beast.html
FILE king-of-spam-festi-botnet-analysis.pdf
FILE Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co.htm
FILE Koobface Anti-Emulation Time Lock Trick _ Security News.htm
FILE KYE-Conficker.pdf
FILE leouncia-yet-another-backdoor.html
FILE leouncia-yet-another-backdoor-part-2.html
FILE Lessons from Conficker.pdf
FILE little doggy.pdf
FILE malcode-context-api-abuse_33649.pdf
FILE malwareforensics.pdf
FILE Mariposa Botnet Analysis.pdf
FILE More human than human – Flame’s code injection techniques.htm
FILE Obfuscation of Executable Code to Improve Resistance to Static Disassembly.pdf
FILE On_the_Analysis_of_the_Zeus_Botnet_Crimeware.pdf
FILE opaque predicate detection by abstraction.pdf
FILE opaque_predicates1.pdf
FILE opaque_predicates2.pdf
FILE Peer-to-Peer Communication Across Network Address Translators.htm
FILE PEST-CONTROL.pdf
FILE Process-Hollowing.pdf
FILE provenance.pdf
FILE Puppet process.htm
FILE Reflections on Conficker.pdf
FILE remote-library-injection.pdf
FILE Robust Efficient Distributed RSA-Key Generation.pdf
FILE ROOTKITS.PDF
FILE Roots_of_Evil (general rootkit).pdf
FILE Roundtable on Malware Defense.pdf
FILE rp-predicting-stealth-attacks.pdf
FILE RustockB.pdf
FILE RustockC (Dr. Web).pdf
FILE Same Botnet, Same Guys, New Code -- Kelihos.pdf
FILE Shin_TIFS12_Conficker.pdf
FILE Silon_Analysis_v5_PR-MBfinal.pdf
FILE skywiper.pdf
FILE Sophos_ZeroAccess_Botnet.pdf
FILE SpyEye_Soldier_BotnetCaseStudy.pdf
FILE Storm_Worm_Botnet_Analysis_-_June_2008.pdf
FILE study_of_pushdo.pdf
FILE Stuxnet_Under_the_Microscope.pdf
FILE SybilAttack.pdf
FILE TDL3-Analysis.pdf
FILE The Art of Bootkit Development.pdf
FILE The Art of Unpacking.pdf
FILE The Growing Harm of Not Teaching Malware.pdf
FILE The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks.htm
FILE The New Face of War (Stuxnet).pdf
FILE The Ultimate Anti-Debugging Reference.pdf
FILE the_bredolab_files.pdf
FILE the_downadup_codex_ed1.pdf
FILE the_downadup_codex_ed2.pdf
FILE The_Evolution_of_TDL4x64.pdf
FILE the-dead-giveaways-of-vm-aware-malware.html
FILE ThisPassingStorm.pdf
FILE top50badhostsandnetworks.pdf
FILE Towards Static Analysis of Virtualization-Obfusctated Binaries.pdf
FILE trojan_zeroaccess_infection_analysis.pdf
FILE utilizing entropy to identify undetected malware.pdf
FILE w32_duqu_the_precursor_to_the_next_stuxnet.pdf
FILE w32_qakbot_in_detail.pdf
FILE w32_stuxnet_dossier.pdf
FILE W32_Waledac.pdf
FILE w32_xpaj_b (complex PE infector).pdf
FILE waledac-ec2nd09.pdf
FILE weaver-conficker.pdf
FILE wp_the-real-face-of-koobface.pdf
FILE wp_w32-tinba-tinybanker.pdf
FILE Yet_Another_Rustock_Analysis.pdf
FILE Your Botnet is My Botnet--Analysis of a Botnet Takeover.pdf
FILE zeroaccess_analysis.pdf
FILE ZeroAccess’s trick – A wolf in sheep’s clothing.htm
FILE zeroaccess2.pdf
FILE zeroaccess-code-injection-chronicles.htm
FILE zeroaccess-misleads-memory-file-link.htm
FILE zeus_king_of_bots.pdf
FILE ZeuS_the_missing_manual_v1.pdf
FILE ZeusSpyEyeBankingTrojanAnalysis.pdf
FOLDER Abusing Forced Inline in C _ Development & Security_files\
FOLDER Abusing Forced Inline Part 2 Breakpoints _ Development & Security_files\
FOLDER An Analysis of Conficker C_files\
FOLDER An Analysis of Conficker_files\
FOLDER an-overview-of-rustock_files\
FOLDER Context_files\
FOLDER decrypting-carberp-c-communication_files\
FOLDER fastflux_files\
FOLDER Heaven'sGate_files\
FOLDER how-to-defeat-koobface_files\
FOLDER kasperskyOnRustock_files\
FOLDER KelihosAnalysis_files\
FOLDER killing-the-beast_files\
FOLDER Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co_files\
FOLDER Koobface Anti-Emulation Time Lock Trick _ Security News_files\
FOLDER leouncia-yet-another-backdoor_files\
FOLDER leouncia-yet-another-backdoor-part-2_files\
FOLDER More human than human – Flame’s code injection techniques_files\
FOLDER Peer-to-Peer Communication Across Network Address Translators_files\
FOLDER Puppet process_files\
FOLDER The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks_files\
FOLDER the-dead-giveaways-of-vm-aware-malware_files\
FOLDER ZeroAccess’s trick – A wolf in sheep’s clothing_files\
FOLDER zeroaccess-code-injection-chronicles_files\
FOLDER zeroaccess-misleads-memory-file-link_files\
Download Link :
Hidden Content:
You must reply to see links
Credits to the owners/makers of those papers.
Hidden Content:
You must reply to see links
Some whitehat papers of the anomalies of the government and other economic leaders.
Hidden Content:
You must reply to see links
Basic Papers / Check other pages for some basic stuff about Security Viruses.
Hidden Content:
You must reply to see links
It's the Huge list for exploits/News/Vulnerabilities everything you need if your a security/malware researcher.