For Support and Advertisement you can contact  701491310 c0defire@xmpp.jp

Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Some Papers for you guys.
#41
(09-02-2013, 10:29 PM)Codefire Wrote:  Consists of :

Code:
FILE    2007_28C3_Effective_DoS_on_web_application_platforms.pdf
FILE    3755.Microsoft Study into b70.pdf
FILE    A Case Study on the Asprox Botnet SQL Infection Dynamics.pdf
FILE    A Comparitive Analysis of Rootkit Detection Techniques.pdf
FILE    A Multifaceted Approach to Understanding the Botnet Phenomenon.pdf
FILE    a_museum_of_api_obfuscation_on_win32.pdf
FILE    Abusing Forced Inline in C _ Development & Security.htm
FILE    Abusing Forced Inline Part 2  Breakpoints _ Development & Security.htm
FILE    Advanced Persistent Threats.pdf
FILE    advancedApproachToDllInjectionAndHooking.pdf
FILE    An Advanced Hybrid Peer-to-Peer Botnet.pdf
FILE    An Analysis of Conficker C.html
FILE    An Analysis of Conficker.htm
FILE    Analysis_W32.Virut_.ce_.pdf
FILE    Analysis-of-TR.Spy_.SpyEye.pdf
FILE    an-overview-of-rustock.html
FILE    Anti-Debugging A Developer's View.pdf
FILE    anti-emulation through time-lock puzzles.pdf
FILE    anti-vm anti-emulation.pdf
FILE    AusCERT_2011_Andreas_Baumhof_V2.pdf
FILE    auscert2009-confickersinkhole.pdf
FILE    BH_US_08_Stewart_Protocols_of_the_Storm.pdf
FILE    BlackEnergy+DDoS+Bot+Analysis.pdf
FILE    blackhat2012-paper.pdf
FILE    blackhat2012-presentation.pdf
FILE    blackhole_paper_mar2012.pdf
FILE    Camouflage in Malware.pdf
FILE    Carberp - A Modular Information Stealing Trojan.pdf
FILE    Carberp and Ring 0 (+ blackhole).pdf
FILE    Carberp_Analysis (Trusteer).pdf
FILE    clash-titans-zeus-spyeye_33393.pdf
FILE    Combating Threats - W32 Sality.pdf
FILE    common substring analysis.pdf
FILE    Conficker_Working_Group_Lessons_Learned_17_June_2010_final.pdf
FILE    conficker-analysis.pdf
FILE    contextcarberp.htm
FILE    ContextCarberpAnalysis.htm
FILE    COSIC_Srizbi.pdf
FILE    costofspam.pdf
FILE    cutwail-LEET11.pdf
FILE    decrypting-carberp-c-communication.html
FILE    defeating rop.pdf
FILE    entropy_analysis_encrypted_packed_malware.pdf
FILE    ESET_win32georbot_analysis_final.pdf
FILE    evasion and detection of metamorphic viruses.pdf
FILE    EventPairsHandle.pdf
FILE    FASTFLUX.HTM
FILE    flame.pdf
FILE    hc128_p3.pdf
FILE    Heaven'sGate.html
FILE    Hodprot-Report.pdf
FILE    how-to-defeat-koobface.html
FILE    HS-P005_ReflectiveDllInjection.pdf
FILE    hydraq_final_231538.pdf
FILE    iwm-koobface.pdf
FILE    kasperskyOnRustock.htm
FILE    KelihosAnalysis.htm
FILE    killing-the-beast.html
FILE    king-of-spam-festi-botnet-analysis.pdf
FILE    Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co.htm
FILE    Koobface Anti-Emulation Time Lock Trick _ Security News.htm
FILE    KYE-Conficker.pdf
FILE    leouncia-yet-another-backdoor.html
FILE    leouncia-yet-another-backdoor-part-2.html
FILE    Lessons from Conficker.pdf
FILE    little doggy.pdf
FILE    malcode-context-api-abuse_33649.pdf
FILE    malwareforensics.pdf
FILE    Mariposa Botnet Analysis.pdf
FILE    More human than human – Flame’s code injection techniques.htm
FILE    Obfuscation of Executable Code to Improve Resistance to Static Disassembly.pdf
FILE    On_the_Analysis_of_the_Zeus_Botnet_Crimeware.pdf
FILE    opaque predicate detection by abstraction.pdf
FILE    opaque_predicates1.pdf
FILE    opaque_predicates2.pdf
FILE    Peer-to-Peer Communication Across Network Address Translators.htm
FILE    PEST-CONTROL.pdf
FILE    Process-Hollowing.pdf
FILE    provenance.pdf
FILE    Puppet process.htm
FILE    Reflections on Conficker.pdf
FILE    remote-library-injection.pdf
FILE    Robust Efficient Distributed RSA-Key Generation.pdf
FILE    ROOTKITS.PDF
FILE    Roots_of_Evil (general rootkit).pdf
FILE    Roundtable on Malware Defense.pdf
FILE    rp-predicting-stealth-attacks.pdf
FILE    RustockB.pdf
FILE    RustockC (Dr. Web).pdf
FILE    Same Botnet, Same Guys, New Code -- Kelihos.pdf
FILE    Shin_TIFS12_Conficker.pdf
FILE    Silon_Analysis_v5_PR-MBfinal.pdf
FILE    skywiper.pdf
FILE    Sophos_ZeroAccess_Botnet.pdf
FILE    SpyEye_Soldier_BotnetCaseStudy.pdf
FILE    Storm_Worm_Botnet_Analysis_-_June_2008.pdf
FILE    study_of_pushdo.pdf
FILE    Stuxnet_Under_the_Microscope.pdf
FILE    SybilAttack.pdf
FILE    TDL3-Analysis.pdf
FILE    The Art of Bootkit Development.pdf
FILE    The Art of Unpacking.pdf
FILE    The Growing Harm of Not Teaching Malware.pdf
FILE    The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks.htm
FILE    The New Face of War (Stuxnet).pdf
FILE    The Ultimate Anti-Debugging Reference.pdf
FILE    the_bredolab_files.pdf
FILE    the_downadup_codex_ed1.pdf
FILE    the_downadup_codex_ed2.pdf
FILE    The_Evolution_of_TDL4x64.pdf
FILE    the-dead-giveaways-of-vm-aware-malware.html
FILE    ThisPassingStorm.pdf
FILE    top50badhostsandnetworks.pdf
FILE    Towards Static Analysis of Virtualization-Obfusctated Binaries.pdf
FILE    trojan_zeroaccess_infection_analysis.pdf
FILE    utilizing entropy to identify undetected malware.pdf
FILE    w32_duqu_the_precursor_to_the_next_stuxnet.pdf
FILE    w32_qakbot_in_detail.pdf
FILE    w32_stuxnet_dossier.pdf
FILE    W32_Waledac.pdf
FILE    w32_xpaj_b (complex PE infector).pdf
FILE    waledac-ec2nd09.pdf
FILE    weaver-conficker.pdf
FILE    wp_the-real-face-of-koobface.pdf
FILE    wp_w32-tinba-tinybanker.pdf
FILE    Yet_Another_Rustock_Analysis.pdf
FILE    Your Botnet is My Botnet--Analysis of a Botnet Takeover.pdf
FILE    zeroaccess_analysis.pdf
FILE    ZeroAccess’s trick – A wolf in sheep’s clothing.htm
FILE    zeroaccess2.pdf
FILE    zeroaccess-code-injection-chronicles.htm
FILE    zeroaccess-misleads-memory-file-link.htm
FILE    zeus_king_of_bots.pdf
FILE    ZeuS_the_missing_manual_v1.pdf
FILE    ZeusSpyEyeBankingTrojanAnalysis.pdf
FOLDER    Abusing Forced Inline in C _ Development & Security_files\
FOLDER    Abusing Forced Inline Part 2  Breakpoints _ Development & Security_files\
FOLDER    An Analysis of Conficker C_files\
FOLDER    An Analysis of Conficker_files\
FOLDER    an-overview-of-rustock_files\
FOLDER    Context_files\
FOLDER    decrypting-carberp-c-communication_files\
FOLDER    fastflux_files\
FOLDER    Heaven'sGate_files\
FOLDER    how-to-defeat-koobface_files\
FOLDER    kasperskyOnRustock_files\
FOLDER    KelihosAnalysis_files\
FOLDER    killing-the-beast_files\
FOLDER    Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co_files\
FOLDER    Koobface Anti-Emulation Time Lock Trick _ Security News_files\
FOLDER    leouncia-yet-another-backdoor_files\
FOLDER    leouncia-yet-another-backdoor-part-2_files\
FOLDER    More human than human – Flame’s code injection techniques_files\
FOLDER    Peer-to-Peer Communication Across Network Address Translators_files\
FOLDER    Puppet process_files\
FOLDER    The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks_files\
FOLDER    the-dead-giveaways-of-vm-aware-malware_files\
FOLDER    ZeroAccess’s trick – A wolf in sheep’s clothing_files\
FOLDER    zeroaccess-code-injection-chronicles_files\
FOLDER    zeroaccess-misleads-memory-file-link_files\

Download Link :

Credits to the owners/makers of those papers.

 Some whitehat papers of the anomalies of the government and other economic leaders.
 Basic Papers / Check other pages for some basic stuff about Security Viruses.



 It's the Huge list for exploits/News/Vulnerabilities everything you need if your a security/malware researcher.
Reply
For Support and Advertisement you can contact  701491310 c0defire@xmpp.jp
#42
Thanks for sharing, looks like I will have a lot of reading ahead.
Reply
#43
Thanks bro!!! keepit up.
Reply
#44
(09-02-2013, 10:29 PM)Codefire Wrote:  Consists of :

Code:
FILE    2007_28C3_Effective_DoS_on_web_application_platforms.pdf
FILE    3755.Microsoft Study into b70.pdf
FILE    A Case Study on the Asprox Botnet SQL Infection Dynamics.pdf
FILE    A Comparitive Analysis of Rootkit Detection Techniques.pdf
FILE    A Multifaceted Approach to Understanding the Botnet Phenomenon.pdf
FILE    a_museum_of_api_obfuscation_on_win32.pdf
FILE    Abusing Forced Inline in C _ Development & Security.htm
FILE    Abusing Forced Inline Part 2  Breakpoints _ Development & Security.htm
FILE    Advanced Persistent Threats.pdf
FILE    advancedApproachToDllInjectionAndHooking.pdf
FILE    An Advanced Hybrid Peer-to-Peer Botnet.pdf
FILE    An Analysis of Conficker C.html
FILE    An Analysis of Conficker.htm
FILE    Analysis_W32.Virut_.ce_.pdf
FILE    Analysis-of-TR.Spy_.SpyEye.pdf
FILE    an-overview-of-rustock.html
FILE    Anti-Debugging A Developer's View.pdf
FILE    anti-emulation through time-lock puzzles.pdf
FILE    anti-vm anti-emulation.pdf
FILE    AusCERT_2011_Andreas_Baumhof_V2.pdf
FILE    auscert2009-confickersinkhole.pdf
FILE    BH_US_08_Stewart_Protocols_of_the_Storm.pdf
FILE    BlackEnergy+DDoS+Bot+Analysis.pdf
FILE    blackhat2012-paper.pdf
FILE    blackhat2012-presentation.pdf
FILE    blackhole_paper_mar2012.pdf
FILE    Camouflage in Malware.pdf
FILE    Carberp - A Modular Information Stealing Trojan.pdf
FILE    Carberp and Ring 0 (+ blackhole).pdf
FILE    Carberp_Analysis (Trusteer).pdf
FILE    clash-titans-zeus-spyeye_33393.pdf
FILE    Combating Threats - W32 Sality.pdf
FILE    common substring analysis.pdf
FILE    Conficker_Working_Group_Lessons_Learned_17_June_2010_final.pdf
FILE    conficker-analysis.pdf
FILE    contextcarberp.htm
FILE    ContextCarberpAnalysis.htm
FILE    COSIC_Srizbi.pdf
FILE    costofspam.pdf
FILE    cutwail-LEET11.pdf
FILE    decrypting-carberp-c-communication.html
FILE    defeating rop.pdf
FILE    entropy_analysis_encrypted_packed_malware.pdf
FILE    ESET_win32georbot_analysis_final.pdf
FILE    evasion and detection of metamorphic viruses.pdf
FILE    EventPairsHandle.pdf
FILE    FASTFLUX.HTM
FILE    flame.pdf
FILE    hc128_p3.pdf
FILE    Heaven'sGate.html
FILE    Hodprot-Report.pdf
FILE    how-to-defeat-koobface.html
FILE    HS-P005_ReflectiveDllInjection.pdf
FILE    hydraq_final_231538.pdf
FILE    iwm-koobface.pdf
FILE    kasperskyOnRustock.htm
FILE    KelihosAnalysis.htm
FILE    killing-the-beast.html
FILE    king-of-spam-festi-botnet-analysis.pdf
FILE    Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co.htm
FILE    Koobface Anti-Emulation Time Lock Trick _ Security News.htm
FILE    KYE-Conficker.pdf
FILE    leouncia-yet-another-backdoor.html
FILE    leouncia-yet-another-backdoor-part-2.html
FILE    Lessons from Conficker.pdf
FILE    little doggy.pdf
FILE    malcode-context-api-abuse_33649.pdf
FILE    malwareforensics.pdf
FILE    Mariposa Botnet Analysis.pdf
FILE    More human than human – Flame’s code injection techniques.htm
FILE    Obfuscation of Executable Code to Improve Resistance to Static Disassembly.pdf
FILE    On_the_Analysis_of_the_Zeus_Botnet_Crimeware.pdf
FILE    opaque predicate detection by abstraction.pdf
FILE    opaque_predicates1.pdf
FILE    opaque_predicates2.pdf
FILE    Peer-to-Peer Communication Across Network Address Translators.htm
FILE    PEST-CONTROL.pdf
FILE    Process-Hollowing.pdf
FILE    provenance.pdf
FILE    Puppet process.htm
FILE    Reflections on Conficker.pdf
FILE    remote-library-injection.pdf
FILE    Robust Efficient Distributed RSA-Key Generation.pdf
FILE    ROOTKITS.PDF
FILE    Roots_of_Evil (general rootkit).pdf
FILE    Roundtable on Malware Defense.pdf
FILE    rp-predicting-stealth-attacks.pdf
FILE    RustockB.pdf
FILE    RustockC (Dr. Web).pdf
FILE    Same Botnet, Same Guys, New Code -- Kelihos.pdf
FILE    Shin_TIFS12_Conficker.pdf
FILE    Silon_Analysis_v5_PR-MBfinal.pdf
FILE    skywiper.pdf
FILE    Sophos_ZeroAccess_Botnet.pdf
FILE    SpyEye_Soldier_BotnetCaseStudy.pdf
FILE    Storm_Worm_Botnet_Analysis_-_June_2008.pdf
FILE    study_of_pushdo.pdf
FILE    Stuxnet_Under_the_Microscope.pdf
FILE    SybilAttack.pdf
FILE    TDL3-Analysis.pdf
FILE    The Art of Bootkit Development.pdf
FILE    The Art of Unpacking.pdf
FILE    The Growing Harm of Not Teaching Malware.pdf
FILE    The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks.htm
FILE    The New Face of War (Stuxnet).pdf
FILE    The Ultimate Anti-Debugging Reference.pdf
FILE    the_bredolab_files.pdf
FILE    the_downadup_codex_ed1.pdf
FILE    the_downadup_codex_ed2.pdf
FILE    The_Evolution_of_TDL4x64.pdf
FILE    the-dead-giveaways-of-vm-aware-malware.html
FILE    ThisPassingStorm.pdf
FILE    top50badhostsandnetworks.pdf
FILE    Towards Static Analysis of Virtualization-Obfusctated Binaries.pdf
FILE    trojan_zeroaccess_infection_analysis.pdf
FILE    utilizing entropy to identify undetected malware.pdf
FILE    w32_duqu_the_precursor_to_the_next_stuxnet.pdf
FILE    w32_qakbot_in_detail.pdf
FILE    w32_stuxnet_dossier.pdf
FILE    W32_Waledac.pdf
FILE    w32_xpaj_b (complex PE infector).pdf
FILE    waledac-ec2nd09.pdf
FILE    weaver-conficker.pdf
FILE    wp_the-real-face-of-koobface.pdf
FILE    wp_w32-tinba-tinybanker.pdf
FILE    Yet_Another_Rustock_Analysis.pdf
FILE    Your Botnet is My Botnet--Analysis of a Botnet Takeover.pdf
FILE    zeroaccess_analysis.pdf
FILE    ZeroAccess’s trick – A wolf in sheep’s clothing.htm
FILE    zeroaccess2.pdf
FILE    zeroaccess-code-injection-chronicles.htm
FILE    zeroaccess-misleads-memory-file-link.htm
FILE    zeus_king_of_bots.pdf
FILE    ZeuS_the_missing_manual_v1.pdf
FILE    ZeusSpyEyeBankingTrojanAnalysis.pdf
FOLDER    Abusing Forced Inline in C _ Development & Security_files\
FOLDER    Abusing Forced Inline Part 2  Breakpoints _ Development & Security_files\
FOLDER    An Analysis of Conficker C_files\
FOLDER    An Analysis of Conficker_files\
FOLDER    an-overview-of-rustock_files\
FOLDER    Context_files\
FOLDER    decrypting-carberp-c-communication_files\
FOLDER    fastflux_files\
FOLDER    Heaven'sGate_files\
FOLDER    how-to-defeat-koobface_files\
FOLDER    kasperskyOnRustock_files\
FOLDER    KelihosAnalysis_files\
FOLDER    killing-the-beast_files\
FOLDER    Knockin’ on Heaven’s Gate – Dynamic Processor Mode Switching _ RCE.co_files\
FOLDER    Koobface Anti-Emulation Time Lock Trick _ Security News_files\
FOLDER    leouncia-yet-another-backdoor_files\
FOLDER    leouncia-yet-another-backdoor-part-2_files\
FOLDER    More human than human – Flame’s code injection techniques_files\
FOLDER    Peer-to-Peer Communication Across Network Address Translators_files\
FOLDER    Puppet process_files\
FOLDER    The Lifecycle of Peer-to-Peer (Gameover) ZeuS _ Dell SecureWorks_files\
FOLDER    the-dead-giveaways-of-vm-aware-malware_files\
FOLDER    ZeroAccess’s trick – A wolf in sheep’s clothing_files\
FOLDER    zeroaccess-code-injection-chronicles_files\
FOLDER    zeroaccess-misleads-memory-file-link_files\

Download Link :

Credits to the owners/makers of those papers.

 Some whitehat papers of the anomalies of the government and other economic leaders.
 Basic Papers / Check other pages for some basic stuff about Security Viruses.



 It's the Huge list for exploits/News/Vulnerabilities everything you need if your a security/malware researcher.
Reply
#45
Thankssssssssssssssssssssssssss
Reply
#46
replying to leech ftw
Reply
For Support and Advertisement you can contact  701491310 c0defire@xmpp.jp
#47
Thanks really appreciate it
Reply
#48
hey thnks gonna try this and ohyeah im new.
Reply
#49
Thanks hope the link is working
Reply
#50
great, looks like a fantastic list of papers, thanks!
Reply
 


Forum Jump:


Users browsing this thread: 1 Guest(s)
For Support and Advertisement you can contact  701491310 c0defire@xmpp.jp

About Offensive Community

Offensive Community is a world best underground hacking forum that provides tutorials, latest hacking techniques, free tools and a great online teaching to our members. Join the forum Now.

Feel free to join our community.