CodeExplorer Posted September 30, 2015 Posted September 30, 2015 (edited) Tutorials About VirusesLink download:http://www82.zippyshare.com/v/GFWYz9g2/file.html Tutorials list: (176 tutorials)64-bit rugrats.pdf A Survey of Cryptologic Issues in Computer Virology.pdf Advanced Code Evolution Techniques and Computer Virus Generator Kits.pdf Advanced Metamorphic Techniques in Computer Viruses.pdf Advanced Polymorphic Techniques.pdf AGIS- Towards Automatic Generation of Infection Signatures.pdf Are Metamorphic Viruses Really Invincible-.pdf Attacks on Win32 - Part II.pdf Attacks on Win32.pdf Avoiding Windows Rootkit Detection.pdf Blast off!.pdf Blended Attacks Exploits, Vulnerabilities and Buffer-Overflow Techniques in Computer Viruses.pdf Bolzano Bugs NT.pdf Breaking the Lorez.pdf Cabirn fever.pdf Cain and Abul.pdf Chamber of horrors.pdf Chiba witty blues.pdf Comparative analysis of various ransomware virii.pdf Computer Virus Strategies and Detection Methods.pdf Computer Viruses- The Technology and Evolution of an Artificial Life Form.pdf Coping with Cabanas.pdf CPU bugs, CPU backdoors and consequences on security.pdf Crimea river.pdf Criss-cross.pdf Cryptography- all-out attacks or how to attack cryptography without intensive cryptanalysis.pdf Cryptography and Viruses.pdf Deelaed learning.pdf Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration.pdf Defeating Polymorphism- Beyond Emulation.pdf Defense Against the Dark Arts.pdf Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection.pdf Detecting Internet Worms Using Data Mining Techniques.pdf Detecting Kernel-Level Rootkits Through Binary Analysis.pdf Detecting Malicious Code by Model Checking.pdf Detecting Metamorphic Computer Viruses using Supercompilation.pdf Detecting Metamorphic viruses by using Arbitrary Length of Control Flow Graphs and Nodes Alignment.pdfDetecting Network-based Obfuscated Code Injection Attacks Using Sandboxing.pdf Detecting self-mutating malware using control-flow graph matching.pdf Detecting Unknown Computer Viruses.pdf Detecting Virus Mutations Via Dynamic Matching.pdf Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code.pdf Detection of Self-Mutating Computer Viruses.pdf Discovering and exploiting 802.11 wireless driver vulnerabilities.pdf Do the macarena.pdf Doin' the eagle rock.pdf Drill Seeker.pdf Dynamic detection and classi cation of computer viruses using general behaviour patterns.pdf Dynamical Models for Computer Viruses Propagation.pdf Efficient Static Analysis of Executables For Detecting Malicious Behaviors.pdf Effusion - a new sophisticated injector for Nginx web servers.pdf Enforcing kernel constraints by hardware-assisted virtualization.pdf Evolution, Ecology and Optimization of Digital Organisms.pdf Evolvable Malware.pdf Examining Viruses.pdf Fighting EPO Viruses.pdf File system driver filtering against metamorphic viral coding.pdf Filter-resistant code injection on ARM.pdf Flibi- Evolution.pdf Gatt got your tongue.pdf Happy Gets Lucky-.pdf Heads or tails.pdf Hidan and dangerous.pdf Hidden Rootkits in Windows.pdf Hide'n'Seek- Anatomy of Stealth Malware.pdf High Anxiety.pdf High-Performance Context-Free Parser for Polymorphic Malware Detection.pdf History of Viruses & Worms.pdf 'Holey' virus, Batman!.pdf How dumaru-.pdf HPS.pdf Hunting For Metamorphic.pdf Hunting for undetectable metamorphic viruses.pdf Identification of file infecting viruses through detection of self-reference replication.pdf Imitation of Life- Advanced system for native Artificial Evolution.pdf Impeding Malware Analysis Using Conditional Code Obfuscation.pdf Implementing and Detecting an ACPI BIOS Rootkit.pdf Improving antivirus accuracy with hypervisor assisted analysis.pdf Introducing Stealth Malware Taxonomy.pdf It's a bird, it's a plane, it's Fooperman.pdf It's zell(d)ome the one you expect.pdf Junkie Memorial-.pdf Know Your Enemy- Containing Conficker.pdf Leaps and Bounds.pdf Let them eat brioche.pdf Linux 2.6 kernel exploits.pdf Linux Improvised Userland Scheduler Virus.pdf Loathing Lupper in Linux.pdf Look at that escargot.pdf Looking a Bagift-Horse in the Mouth.pdf Magisterium Abraxas.pdf Malicious crypto - (Ab)use cryptology.pdf Malicious origami in PDF.pdf Malware Analyst's Cookbook and DVD.pdf Mayhem - a hidden threat for -nix web servers.pdf Measuring virtual machine detection in malware using DSD tracer.pdf Memory scanning under Windows NT.pdf Metamorphic Virus- Analysis and Detection.pdf Mobile Malware Attacks and Defense.pdf Modern operating systems.pdf Mostly harmless.pdf Moving To Windows 2000.pdf Network-level polymorphic shellcode detection using emulation.pdf New threats of Java viruses.pdf Next-Generation Viruses Present New Challenges.pdf Not worthy.pdf Olivia.pdf On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits.pdf On the Effectiveness of Address-Space Randomization.pdf Paradise lost.pdf Parvo - One Sick Puppy-.pdf Peer-to-Peer Botnets- Analysis and Detection.pdf Poetry in Motion.pdf Polymorphic and Metamorphic Malware Detection.pdf Practical Detection of Metamorphic Computer Viruses.pdf Practical Malware Analysis.pdf Prescription Medicine.pdf Prophet and loss.pdf Raised hacklez.pdf Revealing Packed Malware.pdf Reverse Code Engineering- An In-Depth Analysis of the Bagle Virus.pdf Reverse Engineering Malware.pdf Sandbox Technology Inside AV Scanners.pdf Secure and advanced unpacking using computer emulation.pdf Semi-automatic binary protection tampering.pdf Shadow Walker - Raising The Bar For Rootkit Detection.pdf Sharpei Behaviour.pdf Shelling Out.pdf SirCamstantial Evidence.pdf Slamdunk.pdf Sleep-Inducing.pdf Sobig, sobigger, sobiggest.pdf Something smells fishy.pdf Spyware & Rootkits.pdf Static Analysis of Binary Code to Isolate Malicious Behaviors.pdf Static Analysis of Executables to Detect Malicious Patterns.pdf Static Detection of Malicious Code in Executable Programs.pdf Stealth malware analysis from kernel space with Kolumbo.pdf Stealth Survival.pdf Stoned Bootkit.pdf Stream of Consciousness.pdf Striking Similarities.pdf Tasting Donut.pdf Testing the SETIHacker Hypothesis.pdf The Art of Computer Virus Research and Defense.pdf The Giant Black Book of Computer Viruses (2nd ed.).pdf The Giant Black Book of Computer Viruses.pdf The Invirsible Man.pdf The Java Mobile Risk.pdf The Little Black Book of Computer Viruses.pdf The Marburg Situation.pdf The missing LNK.pdf The New 32-bit Medusa.pdf The Norman Book on Computer Viruses.pdf The Rise of AutoRunBased Malware.pdf The Risk of Debug Codes in Batch- what are debug codes and why they are dangerous-.pdf The Use of Heuristics in Identifying Self-Propagating Malicious Mobile Code.pdf The wormpipe strikes back.pdf Thoughts about Cross-View based Rootkit Detection.pdf Time machine.pdf To catch Efish.pdf Tricky Relocations.pdf Trojan White Paper.pdf Tumours and polips.pdf Twinkle, twinkle little star.pdf Un combate con el Kerñado.pdf Understanding and Managing Polymorphic Viruses.pdf Unexpected Resutls [sic].pdf User-mode memory scanning on 32-bit & 64-bit windows.pdf Virology 101.pdf VT Integrity Services for Networking.pdf When Java Was One- Threats From Hostile Byte Code.pdf When Malware Meets Rootkits.pdf Worm wars.pdf Zeroing in on Metamorphic Computer Viruses.pdf Zmist Opportunities.pdf Edited September 30, 2015 by CodeCracker 4
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now