/
|
Botconf 2013 poster.png
|
550.4 KB
|
Botconf 2014 poster.jpg
|
975.6 KB
|
Botconf 2015 poster.png
|
3.3 MB
|
Botconf 2016 poster.png
|
441.7 KB
|
Botconf 2017 poster.png
|
1.5 MB
|
Botconf 2018 poster.png
|
8.0 MB
|
Botconf 2019 poster.jpg
|
703.7 KB
|
Botconf 2020 poster.png
|
1.0 MB
|
Botconf 2022 poster.png
|
2.8 MB
|
Botconf 2023 poster.png
|
840.0 KB
|
Botconf 2024 poster.png
|
567.0 KB
|
Botconf logo.png
|
186.4 KB
|
Botconf thank you.txt
|
1.1 KB
|
HEADER.md
|
0.7 KB
|
/.../Botconf 2013 presentations/
|
01-UlrichSeldeslachts-ACDC-1.pdf
|
2.2 MB
|
02-BankingTrojans-ThomasSiebert-1.pdf
|
2.2 MB
|
03-JessadelaTorre-SpamBot-1.pdf
|
2.3 MB
|
05-Coreflood-OguzKaanPehlivan-1.pdf
|
212.7 KB
|
06-VasileiosFriligkos-Correlation-1.pdf
|
554.3 KB
|
07-CyberIntelligence-EnricoBranca.pdf
|
798.6 KB
|
08-Zombies-in-your-browser.pdf
|
1.8 MB
|
09-EtienneStalmans.pdf
|
4.1 MB
|
10-SebastienDuquette-Cdorked-and-Home.pdf
|
2.1 MB
|
11-MaciejKotowicz-MalwareCalling.pdf
|
690.7 KB
|
12-IvanFontarensky-Disass-2.pdf
|
428.2 KB
|
13-ThanhDinhTa.pdf
|
369.1 KB
|
14-DhiaMahjoub-HendrikAdrian-Kelihos.pdf
|
3.0 MB
|
15-JulienLavesque-Perdix.pdf
|
3.0 MB
|
16-PasqualeStirparo-ParticipatoryHoneypots.pdf
|
2.2 MB
|
17-TomUeltschi-Ponmocup-Hunter.pdf
|
5.3 MB
|
18-DavidDecaryHetu-ForumReputation.pdf
|
556.5 KB
|
19-PaulRascagneres.pdf
|
653.9 KB
|
20-JaapvOss-Europol.pdf
|
2.1 MB
|
21-ThomasBarabosch-GeneralPurposeLab.pdf
|
2.5 MB
|
22-RonanMouchoux-DNSResolutionTrafficAnalysis.pdf
|
4.9 MB
|
23-SebastienLarinier-GuillaumeArcas-ExploitKrawler.pdf
|
2.4 MB
|
24-JasonJones-BladeRunner-1.pdf
|
6.6 MB
|
25-ThomasChopiteaMalcon.pdf
|
4.5 MB
|
/.../Botconf 2013 video/
|
Botconf 2013 live stream.mp4
|
3.1 MB
|
David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.mp4
|
24.8 MB
|
Enrico Branca - Using cyber intelligence to detect and localize botnets.mp4
|
18.2 MB
|
Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.mp4
|
33.3 MB
|
Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.mp4
|
26.4 MB
|
Ivan Fontarensky - Disass.mp4
|
9.3 MB
|
Jaap van Oss - Europol and European law enforcement action against botnets.mp4
|
32.2 MB
|
Jason Jones - BladeRunner - Adventures in Tracking Botnets.mp4
|
39.3 MB
|
Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.mp4
|
17.1 MB
|
Maciej Kotowicz - Malware Calling.mp4
|
16.8 MB
|
Paul Rascagne - APT1 - Technical Backstage.mp4
|
28.0 MB
|
Prakhar Prasad and Himanshu Sharma - Zombies in your browser.mp4
|
15.8 MB
|
Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.mp4
|
24.8 MB
|
S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.mp4
|
37.7 MB
|
S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.mp4
|
30.9 MB
|
Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.mp4
|
13.3 MB
|
Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.mp4
|
32.8 MB
|
Thomas Siebert - Advanced Techniques in Modern Banking Trojans.mp4
|
25.2 MB
|
Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.mp4
|
47.8 MB
|
Vasileios Friligkos - Back to life, back to correlation.mp4
|
11.7 MB
|
/.../Botconf 2013 captions/
|
Botconf 2013 live stream.eng.json
|
0.0 KB
|
Botconf 2013 live stream.eng.lrc
|
0.0 KB
|
Botconf 2013 live stream.eng.srt
|
0.0 KB
|
Botconf 2013 live stream.eng.text
|
0.0 KB
|
Botconf 2013 live stream.eng.tsv
|
0.0 KB
|
Botconf 2013 live stream.eng.txt
|
0.0 KB
|
Botconf 2013 live stream.eng.vtt
|
0.0 KB
|
David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.json
|
1.8 MB
|
David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.lrc
|
46.1 KB
|
David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.srt
|
42.6 KB
|
David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.text
|
32.9 KB
|
David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.tsv
|
40.4 KB
|
David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.txt
|
46.6 KB
|
David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.vtt
|
39.8 KB
|
Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.json
|
1.1 MB
|
Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.lrc
|
30.1 KB
|
Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.srt
|
31.7 KB
|
Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.text
|
18.7 KB
|
Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.tsv
|
25.2 KB
|
Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.txt
|
30.6 KB
|
Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.vtt
|
28.0 KB
|
Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.json
|
2.4 MB
|
Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.lrc
|
65.3 KB
|
Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.srt
|
60.2 KB
|
Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.text
|
41.3 KB
|
Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.tsv
|
55.3 KB
|
Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.txt
|
66.3 KB
|
Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.vtt
|
54.7 KB
|
Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.json
|
1.5 MB
|
Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.lrc
|
38.8 KB
|
Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.srt
|
45.2 KB
|
Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.text
|
25.4 KB
|
Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.tsv
|
33.2 KB
|
Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.txt
|
39.3 KB
|
Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.vtt
|
39.6 KB
|
Ivan Fontarensky - Disass.eng.json
|
469.7 KB
|
Ivan Fontarensky - Disass.eng.lrc
|
12.9 KB
|
Ivan Fontarensky - Disass.eng.srt
|
12.4 KB
|
Ivan Fontarensky - Disass.eng.text
|
7.5 KB
|
Ivan Fontarensky - Disass.eng.tsv
|
10.3 KB
|
Ivan Fontarensky - Disass.eng.txt
|
13.1 KB
|
Ivan Fontarensky - Disass.eng.vtt
|
11.1 KB
|
Jaap van Oss - Europol and European law enforcement action against botnets.eng.json
|
1.5 MB
|
Jaap van Oss - Europol and European law enforcement action against botnets.eng.lrc
|
41.1 KB
|
Jaap van Oss - Europol and European law enforcement action against botnets.eng.srt
|
40.2 KB
|
Jaap van Oss - Europol and European law enforcement action against botnets.eng.text
|
28.1 KB
|
Jaap van Oss - Europol and European law enforcement action against botnets.eng.tsv
|
35.6 KB
|
Jaap van Oss - Europol and European law enforcement action against botnets.eng.txt
|
41.6 KB
|
Jaap van Oss - Europol and European law enforcement action against botnets.eng.vtt
|
36.7 KB
|
Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.json
|
2.8 MB
|
Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.lrc
|
74.6 KB
|
Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.srt
|
67.1 KB
|
Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.text
|
46.2 KB
|
Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.tsv
|
63.2 KB
|
Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.txt
|
75.7 KB
|
Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.vtt
|
61.0 KB
|
Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.json
|
763.8 KB
|
Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.lrc
|
21.1 KB
|
Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.srt
|
19.5 KB
|
Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.text
|
13.9 KB
|
Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.tsv
|
17.9 KB
|
Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.txt
|
21.4 KB
|
Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.vtt
|
17.9 KB
|
Maciej Kotowicz - Malware Calling.eng.json
|
605.0 KB
|
Maciej Kotowicz - Malware Calling.eng.lrc
|
15.0 KB
|
Maciej Kotowicz - Malware Calling.eng.srt
|
16.8 KB
|
Maciej Kotowicz - Malware Calling.eng.text
|
10.8 KB
|
Maciej Kotowicz - Malware Calling.eng.tsv
|
13.1 KB
|
Maciej Kotowicz - Malware Calling.eng.txt
|
15.2 KB
|
Maciej Kotowicz - Malware Calling.eng.vtt
|
15.1 KB
|
Paul Rascagne - APT1 - Technical Backstage.eng.json
|
1.1 MB
|
Paul Rascagne - APT1 - Technical Backstage.eng.lrc
|
26.9 KB
|
Paul Rascagne - APT1 - Technical Backstage.eng.srt
|
30.2 KB
|
Paul Rascagne - APT1 - Technical Backstage.eng.text
|
18.4 KB
|
Paul Rascagne - APT1 - Technical Backstage.eng.tsv
|
23.2 KB
|
Paul Rascagne - APT1 - Technical Backstage.eng.txt
|
27.2 KB
|
Paul Rascagne - APT1 - Technical Backstage.eng.vtt
|
26.9 KB
|
Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.json
|
792.2 KB
|
Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.lrc
|
22.9 KB
|
Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.srt
|
21.3 KB
|
Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.text
|
13.1 KB
|
Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.tsv
|
18.5 KB
|
Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.txt
|
23.2 KB
|
Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.vtt
|
18.9 KB
|
Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.json
|
897.0 KB
|
Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.lrc
|
22.0 KB
|
Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.srt
|
24.1 KB
|
Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.text
|
16.7 KB
|
Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.tsv
|
19.7 KB
|
Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.txt
|
22.2 KB
|
Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.vtt
|
22.0 KB
|
S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.json
|
2.0 MB
|
S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.lrc
|
50.9 KB
|
S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.srt
|
53.1 KB
|
S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.text
|
37.3 KB
|
S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.tsv
|
45.3 KB
|
S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.txt
|
51.5 KB
|
S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.vtt
|
48.6 KB
|
S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.json
|
1.1 MB
|
S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.lrc
|
28.1 KB
|
S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.srt
|
27.4 KB
|
S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.text
|
17.9 KB
|
S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.tsv
|
23.6 KB
|
S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.txt
|
28.5 KB
|
S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.vtt
|
24.7 KB
|
Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.json
|
515.8 KB
|
Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.lrc
|
14.1 KB
|
Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.srt
|
13.7 KB
|
Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.text
|
9.1 KB
|
Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.tsv
|
11.8 KB
|
Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.txt
|
14.3 KB
|
Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.vtt
|
12.5 KB
|
Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.json
|
1.9 MB
|
Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.lrc
|
50.8 KB
|
Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.srt
|
46.6 KB
|
Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.text
|
30.7 KB
|
Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.tsv
|
42.2 KB
|
Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.txt
|
51.5 KB
|
Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.vtt
|
42.0 KB
|
Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.json
|
1.5 MB
|
Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.lrc
|
42.1 KB
|
Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.srt
|
39.1 KB
|
Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.text
|
26.9 KB
|
Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.tsv
|
35.6 KB
|
Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.txt
|
42.7 KB
|
Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.vtt
|
35.6 KB
|
Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.json
|
2.3 MB
|
Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.lrc
|
57.6 KB
|
Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.srt
|
63.2 KB
|
Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.text
|
42.0 KB
|
Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.tsv
|
51.3 KB
|
Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.txt
|
58.2 KB
|
Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.vtt
|
57.2 KB
|
Vasileios Friligkos - Back to life, back to correlation.eng.json
|
836.6 KB
|
Vasileios Friligkos - Back to life, back to correlation.eng.lrc
|
23.2 KB
|
Vasileios Friligkos - Back to life, back to correlation.eng.srt
|
22.4 KB
|
Vasileios Friligkos - Back to life, back to correlation.eng.text
|
15.0 KB
|
Vasileios Friligkos - Back to life, back to correlation.eng.tsv
|
19.5 KB
|
Vasileios Friligkos - Back to life, back to correlation.eng.txt
|
23.5 KB
|
Vasileios Friligkos - Back to life, back to correlation.eng.vtt
|
20.3 KB
|
/.../Botconf 2014 presentations/
|
2014-1.2-Keynote-United-Kingdom-National-crime-agency-on-botnet-takedowns.pdf
|
11.0 MB
|
2014-1.3-Semantic-Exploration-of-Binaries.pdf
|
745.9 KB
|
2014-1.5-The-Many-Faces-of-Mevade.pdf
|
13.3 MB
|
2014-1.6-Splicing-and-Dicing-2014-Examining-this-Years-Botnet-Attack-Trends1.pdf
|
3.0 MB
|
2014-1.7-Virus-Tracker.pdf
|
1.5 MB
|
2014-1.8-How-to-Dismantle-a-Botnet-the-Legal-Behind-the-Scenes.pdf
|
920.0 KB
|
2014-2.1-Workshop-Feedback-on-Windbg-Usage.pdf
|
1.2 MB
|
2014-2.2-A-Timeline-of-Mobile-Botnets.pdf
|
6.3 MB
|
2014-2.2-A-Timeline-of-Mobile-Botnets-PAPER.pdf
|
1.5 MB
|
2014-2.4-CONDENSER-A-Graph-Based-Approach-for-Detecting-Botnets.pdf
|
2.3 MB
|
2014-2.4-CONDENSER-A-Graph-Based-Approach-for-Detecting-Botnets-PAPER.pdf
|
172.0 KB
|
2014-2.6-Middle-Income-Malware-Actors-in-Poland-VBKlip-and-Beyond.pdf
|
1.9 MB
|
2014-2.7-Bypassing-Sandboxes-for-Fun.pdf
|
2.2 MB
|
2014-2.9-The-Russian-DDoS-One-Booters-to-Botnets.pdf
|
28.7 MB
|
2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf
|
2.4 MB
|
2014-2.11-Ponmocup-Hunter-2.0-The-Sequel.pdf
|
2.8 MB
|
2014-3.1-A-New-Look-at-Fast-Flux-Proxy-Networks.pdf
|
9.9 MB
|
2014-3.3-DNS-Analytics-Case-Study.pdf
|
3.2 MB
|
2014-3.4-Keynote-A-tour-in-the-Analysis-of-X86-Botnets-at-loria.fr.pdf
|
1.8 MB
|
2014-3.6-ZeuS-Meets-VM-The-Story-so-Far.pdf
|
6.0 MB
|
2014-LT1-5-Martijn-Grooten-Qakbot.pdf
|
248.4 KB
|
2014-LT2-1-Lukasz-Siewierski-Somehow-Unusual-Android-Malware-Sample.pdf
|
321.2 KB
|
2014-LT2-5-Maxime-Morin-Radare2.pdf
|
1.4 MB
|
/.../Botconf 2014 video/
|
Dennis Schwarz - The Russian DDoS One Booters to Botnets.mp4
|
23.6 MB
|
Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.mp4
|
21.9 MB
|
Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.mp4
|
26.5 MB
|
Osama Kamal - DNS Analytics, Case Study.mp4
|
10.8 MB
|
Paul Jung - Bypassing Sandboxes for Fun.mp4
|
21.6 MB
|
Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.mp4
|
20.2 MB
|
Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.mp4
|
23.8 MB
|
Peter Kleissner - Virus Tracker.mp4
|
33.8 MB
|
/.../Botconf 2014 captions/
|
Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.json
|
1.4 MB
|
Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.lrc
|
37.3 KB
|
Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.srt
|
36.8 KB
|
Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.text
|
26.0 KB
|
Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.tsv
|
32.5 KB
|
Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.txt
|
37.8 KB
|
Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.vtt
|
33.7 KB
|
Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.json
|
782.2 KB
|
Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.lrc
|
20.4 KB
|
Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.srt
|
18.9 KB
|
Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.text
|
14.3 KB
|
Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.tsv
|
17.5 KB
|
Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.txt
|
20.6 KB
|
Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.vtt
|
17.6 KB
|
Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.json
|
1.9 MB
|
Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.lrc
|
53.0 KB
|
Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.srt
|
45.4 KB
|
Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.text
|
31.6 KB
|
Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.tsv
|
44.1 KB
|
Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.txt
|
53.8 KB
|
Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.vtt
|
41.4 KB
|
Osama Kamal - DNS Analytics, Case Study.eng.json
|
671.0 KB
|
Osama Kamal - DNS Analytics, Case Study.eng.lrc
|
17.0 KB
|
Osama Kamal - DNS Analytics, Case Study.eng.srt
|
19.2 KB
|
Osama Kamal - DNS Analytics, Case Study.eng.text
|
12.1 KB
|
Osama Kamal - DNS Analytics, Case Study.eng.tsv
|
14.7 KB
|
Osama Kamal - DNS Analytics, Case Study.eng.txt
|
17.2 KB
|
Osama Kamal - DNS Analytics, Case Study.eng.vtt
|
17.2 KB
|
Paul Jung - Bypassing Sandboxes for Fun.eng.json
|
1.4 MB
|
Paul Jung - Bypassing Sandboxes for Fun.eng.lrc
|
35.9 KB
|
Paul Jung - Bypassing Sandboxes for Fun.eng.srt
|
41.2 KB
|
Paul Jung - Bypassing Sandboxes for Fun.eng.text
|
23.2 KB
|
Paul Jung - Bypassing Sandboxes for Fun.eng.tsv
|
30.4 KB
|
Paul Jung - Bypassing Sandboxes for Fun.eng.txt
|
36.4 KB
|
Paul Jung - Bypassing Sandboxes for Fun.eng.vtt
|
36.1 KB
|
Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.json
|
776.7 KB
|
Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.lrc
|
20.1 KB
|
Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.srt
|
22.4 KB
|
Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.text
|
13.9 KB
|
Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.tsv
|
17.4 KB
|
Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.txt
|
20.3 KB
|
Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.vtt
|
20.0 KB
|
Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.json
|
1.1 MB
|
Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.lrc
|
29.7 KB
|
Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.srt
|
32.1 KB
|
Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.text
|
21.7 KB
|
Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.tsv
|
26.2 KB
|
Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.txt
|
30.0 KB
|
Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.vtt
|
29.2 KB
|
Peter Kleissner - Virus Tracker.eng.json
|
2.3 MB
|
Peter Kleissner - Virus Tracker.eng.lrc
|
65.2 KB
|
Peter Kleissner - Virus Tracker.eng.srt
|
58.8 KB
|
Peter Kleissner - Virus Tracker.eng.text
|
40.2 KB
|
Peter Kleissner - Virus Tracker.eng.tsv
|
54.8 KB
|
Peter Kleissner - Virus Tracker.eng.txt
|
66.2 KB
|
Peter Kleissner - Virus Tracker.eng.vtt
|
53.4 KB
|
/.../Botconf 2015 presentations/
|
2.htm
|
17.6 KB
|
3.htm
|
19.5 KB
|
4.htm
|
17.9 KB
|
7XM167MJ.htm
|
28.9 KB
|
a-moose-once-bit-my-honeypot.htm
|
35.3 KB
|
CJYV2O6G.htm
|
59.9 KB
|
dga-domain-classification.htm
|
70.1 KB
|
OK-K01-Margarita-Louca-Botnet-takedowns-cooperation.pdf
|
1.8 MB
|
OK-LT01-Kurtis-ArmourBrowser-and-Environment-Hardening.pdf
|
912.8 KB
|
OK-LT02-Christ-Dietrich-Stegoloader.pdf
|
138.9 KB
|
OK-LT05-Martijn-Grooten-The-State-of-Spam-in-2015.pdf
|
225.5 KB
|
OK-LT06-Hugo-Rifflet-Python-log-parser-Flask-Log-Map.pdf
|
543.9 KB
|
OK-LT07-Robin-David-Dynamic-symbolic-execution-for-malware-reverse-engineering.pdf
|
329.8 KB
|
OK-LT08-Roy-Firestein-Cymon.pdf
|
1.4 MB
|
OK-LT09-Xavier-Mertens-Automatic-MIME-attachments-triage.pdf
|
534.4 KB
|
OK-LT10-Wayne-Crowder-Wrestling-elephants-Tackling-malware-research-issues.pdf
|
858.2 KB
|
OK-LT11-Johanne-Ulloa-Nolimitsecu.pdf
|
1.1 MB
|
OK-P01-Maarten-van-Dantzig-Yonathan-Klijnsma-Ponmocup.pdf
|
12.5 MB
|
OK-P03-Frank-Denis-The-missing-piece-in-threat-intelligence.pdf
|
15.8 MB
|
OK-P04-Marc-Doudiet-Honey-Where-is-my-PoS.pdf
|
1.3 MB
|
OK-P05-John-Bambenek-Takedowns-Case-studies-and-what-we-all-could-be-doing-better.pdf
|
3.4 MB
|
OK-P06-Plohmann-DGArchive.pdf
|
739.9 KB
|
OK-P07-Jose-Esparza-Travelling-to-the-far-side-of-Andromeda-2.pdf
|
1.4 MB
|
OK-P08-Mikhail-Kuzin-Nikita-Buchka-Whose-phone-is-in-your-pocket.pdf
|
2.4 MB
|
OK-P09-Malatras_Beslay_Botconf2015.pdf
|
986.9 KB
|
OK-P10-Paul-Jung-Box-BotNets.pdf
|
3.9 MB
|
OK-P11-Matthieu-Kaczmarek-Malware-Instrumentation-Application-to-Regin-Analysis.pdf
|
1.2 MB
|
OK-P12-Mark-Graham-Practical-Experiences-of-Building-an-IPFIX-Based-Open-Source-Botnet-Detector.pdf
|
1.5 MB
|
OK-P13-Liu-Ya-Automatically-Classify-Unknown-Bots-by-The-Register-Messages.pdf
|
926.3 KB
|
OK-P14-Yonathan-Klijnsma-The-Story-of-CryptoWall-a-historical-analysis-of-a-large-scale-cryptographic-ransomware-threat.pdf
|
31.0 MB
|
OK-P15-Renaud-Bidou-Powered-by-Javascript.pdf
|
3.3 MB
|
OK-P17-Chaouki-Kasmi-Jose-Lopes-Esteves-Philippe-Valembois-Air-Gap-Command-Control-IEMI.pdf
|
1.9 MB
|
OK-P18-Kleissner-Sality.pdf
|
1.6 MB
|
OK-P19-Olivier-Bilodeau-A-moose-once-bit-my-honeypot.pdf
|
7.1 MB
|
OK-P20-Thomas-Barabosch-Behavior-driven-development-in-malware-analysis.pdf
|
2.2 MB
|
OK-S01-Alex-Chailytko-Alex-Trafimcuk-DGA-clustering-and-analysis-mastering-modern-evolving-threats.pdf
|
604.9 KB
|
OK-S02-Zoltan-Balazs-Sandbox_mapping_botconf.pdf
|
1.4 MB
|
OK-S04-Veronica-Valeros-Make-it-count_v3.pdf
|
3.6 MB
|
OK-S05-Josiah-Hagen-Building-a-better-botnet-DGA-mousetrap-separating-mice-rats-and-cheese-in-DNS-data.pdf
|
2.2 MB
|
/.../Botconf 2015 video/
|
A moose once bit my honeypot - A story of an embedded Linux botnet.mp4
|
77.9 MB
|
Air-gap limitations and bypass techniques.mp4
|
85.1 MB
|
Automatically classifying unknown bots by the register messages.mp4
|
35.5 MB
|
Behavior driven development in malware analysis.mp4
|
49.3 MB
|
BoxBotNet.mp4
|
51.7 MB
|
Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.mp4
|
30.7 MB
|
Building a hybrid experimental platform for mobile botnet research.mp4
|
54.6 MB
|
DGA clustering and analysis mastering modern, evolving threats.mp4
|
32.2 MB
|
DGArchive - A deep dive into domain generating malware.mp4
|
93.4 MB
|
Inside traffic exchange networks.mp4
|
50.4 MB
|
Make It count An analysis of a brute forcing botnet.mp4
|
36.0 MB
|
Malware Instrumentation Application to Regin Analysis.mp4
|
95.4 MB
|
Mobile botnet malware collection.mp4
|
48.6 MB
|
Mostly Polish threat landscape not only VBKlip.mp4
|
48.2 MB
|
Powered by JavaScript.mp4
|
51.4 MB
|
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.mp4
|
77.0 MB
|
Sality.mp4
|
65.0 MB
|
Sandbox detection for the masses leak, abuse, test.mp4
|
38.0 MB
|
Takedowns case studies and what we all could be doing better.mp4
|
119.1 MB
|
The missing piece in threat intelligence.mp4
|
106.6 MB
|
The Story of Cryptowall.mp4
|
59.9 MB
|
Travelling to the far side of Andromeda.mp4
|
52.7 MB
|
/.../Botconf 2015 captions/
|
A moose once bit my honeypot - A story of an embedded Linux botnet.eng.json
|
2.3 MB
|
A moose once bit my honeypot - A story of an embedded Linux botnet.eng.lrc
|
66.9 KB
|
A moose once bit my honeypot - A story of an embedded Linux botnet.eng.srt
|
53.2 KB
|
A moose once bit my honeypot - A story of an embedded Linux botnet.eng.text
|
36.5 KB
|
A moose once bit my honeypot - A story of an embedded Linux botnet.eng.tsv
|
54.3 KB
|
A moose once bit my honeypot - A story of an embedded Linux botnet.eng.txt
|
68.0 KB
|
A moose once bit my honeypot - A story of an embedded Linux botnet.eng.vtt
|
48.2 KB
|
Air-gap limitations and bypass techniques.eng.json
|
1.6 MB
|
Air-gap limitations and bypass techniques.eng.lrc
|
43.2 KB
|
Air-gap limitations and bypass techniques.eng.srt
|
42.8 KB
|
Air-gap limitations and bypass techniques.eng.text
|
30.8 KB
|
Air-gap limitations and bypass techniques.eng.tsv
|
38.1 KB
|
Air-gap limitations and bypass techniques.eng.txt
|
43.7 KB
|
Air-gap limitations and bypass techniques.eng.vtt
|
39.4 KB
|
Automatically classifying unknown bots by the register messages.eng.json
|
733.7 KB
|
Automatically classifying unknown bots by the register messages.eng.lrc
|
20.4 KB
|
Automatically classifying unknown bots by the register messages.eng.srt
|
22.5 KB
|
Automatically classifying unknown bots by the register messages.eng.text
|
14.3 KB
|
Automatically classifying unknown bots by the register messages.eng.tsv
|
17.7 KB
|
Automatically classifying unknown bots by the register messages.eng.txt
|
20.7 KB
|
Automatically classifying unknown bots by the register messages.eng.vtt
|
20.2 KB
|
Behavior driven development in malware analysis.eng.json
|
1.5 MB
|
Behavior driven development in malware analysis.eng.lrc
|
40.9 KB
|
Behavior driven development in malware analysis.eng.srt
|
35.8 KB
|
Behavior driven development in malware analysis.eng.text
|
25.6 KB
|
Behavior driven development in malware analysis.eng.tsv
|
34.5 KB
|
Behavior driven development in malware analysis.eng.txt
|
41.5 KB
|
Behavior driven development in malware analysis.eng.vtt
|
32.8 KB
|
BoxBotNet.eng.json
|
1.3 MB
|
BoxBotNet.eng.lrc
|
33.7 KB
|
BoxBotNet.eng.srt
|
38.5 KB
|
BoxBotNet.eng.text
|
20.4 KB
|
BoxBotNet.eng.tsv
|
28.0 KB
|
BoxBotNet.eng.txt
|
34.2 KB
|
BoxBotNet.eng.vtt
|
33.3 KB
|
Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.json
|
824.5 KB
|
Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.lrc
|
22.0 KB
|
Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.srt
|
21.2 KB
|
Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.text
|
15.8 KB
|
Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.tsv
|
19.1 KB
|
Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.txt
|
22.3 KB
|
Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.vtt
|
19.7 KB
|
Building a hybrid experimental platform for mobile botnet research.eng.json
|
1.7 MB
|
Building a hybrid experimental platform for mobile botnet research.eng.lrc
|
52.9 KB
|
Building a hybrid experimental platform for mobile botnet research.eng.srt
|
38.3 KB
|
Building a hybrid experimental platform for mobile botnet research.eng.text
|
29.0 KB
|
Building a hybrid experimental platform for mobile botnet research.eng.tsv
|
42.8 KB
|
Building a hybrid experimental platform for mobile botnet research.eng.txt
|
53.9 KB
|
Building a hybrid experimental platform for mobile botnet research.eng.vtt
|
35.5 KB
|
DGA clustering and analysis mastering modern, evolving threats.eng.json
|
1.1 MB
|
DGA clustering and analysis mastering modern, evolving threats.eng.lrc
|
30.6 KB
|
DGA clustering and analysis mastering modern, evolving threats.eng.srt
|
29.6 KB
|
DGA clustering and analysis mastering modern, evolving threats.eng.text
|
19.7 KB
|
DGA clustering and analysis mastering modern, evolving threats.eng.tsv
|
25.8 KB
|
DGA clustering and analysis mastering modern, evolving threats.eng.txt
|
31.0 KB
|
DGA clustering and analysis mastering modern, evolving threats.eng.vtt
|
26.8 KB
|
DGArchive - A deep dive into domain generating malware.eng.json
|
2.9 MB
|
DGArchive - A deep dive into domain generating malware.eng.lrc
|
85.5 KB
|
DGArchive - A deep dive into domain generating malware.eng.srt
|
67.7 KB
|
DGArchive - A deep dive into domain generating malware.eng.text
|
47.5 KB
|
DGArchive - A deep dive into domain generating malware.eng.tsv
|
69.9 KB
|
DGArchive - A deep dive into domain generating malware.eng.txt
|
86.9 KB
|
DGArchive - A deep dive into domain generating malware.eng.vtt
|
61.7 KB
|
Inside traffic exchange networks.eng.json
|
1.7 MB
|
Inside traffic exchange networks.eng.lrc
|
48.4 KB
|
Inside traffic exchange networks.eng.srt
|
41.8 KB
|
Inside traffic exchange networks.eng.text
|
26.9 KB
|
Inside traffic exchange networks.eng.tsv
|
39.4 KB
|
Inside traffic exchange networks.eng.txt
|
49.2 KB
|
Inside traffic exchange networks.eng.vtt
|
37.5 KB
|
Make It count An analysis of a brute forcing botnet.eng.json
|
929.3 KB
|
Make It count An analysis of a brute forcing botnet.eng.lrc
|
22.6 KB
|
Make It count An analysis of a brute forcing botnet.eng.srt
|
25.6 KB
|
Make It count An analysis of a brute forcing botnet.eng.text
|
17.4 KB
|
Make It count An analysis of a brute forcing botnet.eng.tsv
|
20.3 KB
|
Make It count An analysis of a brute forcing botnet.eng.txt
|
22.8 KB
|
Make It count An analysis of a brute forcing botnet.eng.vtt
|
23.3 KB
|
Malware Instrumentation Application to Regin Analysis.eng.json
|
1.5 MB
|
Malware Instrumentation Application to Regin Analysis.eng.lrc
|
46.1 KB
|
Malware Instrumentation Application to Regin Analysis.eng.srt
|
37.2 KB
|
Malware Instrumentation Application to Regin Analysis.eng.text
|
21.9 KB
|
Malware Instrumentation Application to Regin Analysis.eng.tsv
|
36.1 KB
|
Malware Instrumentation Application to Regin Analysis.eng.txt
|
47.0 KB
|
Malware Instrumentation Application to Regin Analysis.eng.vtt
|
32.7 KB
|
Mobile botnet malware collection.eng.json
|
880.4 KB
|
Mobile botnet malware collection.eng.lrc
|
24.3 KB
|
Mobile botnet malware collection.eng.srt
|
23.9 KB
|
Mobile botnet malware collection.eng.text
|
15.8 KB
|
Mobile botnet malware collection.eng.tsv
|
20.5 KB
|
Mobile botnet malware collection.eng.txt
|
24.6 KB
|
Mobile botnet malware collection.eng.vtt
|
21.6 KB
|
Mostly Polish threat landscape not only VBKlip.eng.json
|
1.1 MB
|
Mostly Polish threat landscape not only VBKlip.eng.lrc
|
27.2 KB
|
Mostly Polish threat landscape not only VBKlip.eng.srt
|
27.8 KB
|
Mostly Polish threat landscape not only VBKlip.eng.text
|
21.3 KB
|
Mostly Polish threat landscape not only VBKlip.eng.tsv
|
24.7 KB
|
Mostly Polish threat landscape not only VBKlip.eng.txt
|
27.5 KB
|
Mostly Polish threat landscape not only VBKlip.eng.vtt
|
26.0 KB
|
Powered by JavaScript.eng.json
|
1.5 MB
|
Powered by JavaScript.eng.lrc
|
38.2 KB
|
Powered by JavaScript.eng.srt
|
44.4 KB
|
Powered by JavaScript.eng.text
|
24.8 KB
|
Powered by JavaScript.eng.tsv
|
32.4 KB
|
Powered by JavaScript.eng.txt
|
38.7 KB
|
Powered by JavaScript.eng.vtt
|
38.9 KB
|
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.json
|
1.8 MB
|
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.lrc
|
44.1 KB
|
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.srt
|
49.1 KB
|
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.text
|
32.9 KB
|
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.tsv
|
39.5 KB
|
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.txt
|
44.5 KB
|
Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.vtt
|
44.5 KB
|
Sality.eng.json
|
1.5 MB
|
Sality.eng.lrc
|
38.7 KB
|
Sality.eng.srt
|
39.5 KB
|
Sality.eng.text
|
25.8 KB
|
Sality.eng.tsv
|
33.3 KB
|
Sality.eng.txt
|
39.2 KB
|
Sality.eng.vtt
|
35.6 KB
|
Sandbox detection for the masses leak, abuse, test.eng.json
|
746.0 KB
|
Sandbox detection for the masses leak, abuse, test.eng.lrc
|
18.8 KB
|
Sandbox detection for the masses leak, abuse, test.eng.srt
|
21.0 KB
|
Sandbox detection for the masses leak, abuse, test.eng.text
|
14.3 KB
|
Sandbox detection for the masses leak, abuse, test.eng.tsv
|
16.8 KB
|
Sandbox detection for the masses leak, abuse, test.eng.txt
|
18.9 KB
|
Sandbox detection for the masses leak, abuse, test.eng.vtt
|
19.2 KB
|
Takedowns case studies and what we all could be doing better.eng.json
|
2.9 MB
|
Takedowns case studies and what we all could be doing better.eng.lrc
|
69.7 KB
|
Takedowns case studies and what we all could be doing better.eng.srt
|
74.8 KB
|
Takedowns case studies and what we all could be doing better.eng.text
|
51.5 KB
|
Takedowns case studies and what we all could be doing better.eng.tsv
|
62.1 KB
|
Takedowns case studies and what we all could be doing better.eng.txt
|
70.4 KB
|
Takedowns case studies and what we all could be doing better.eng.vtt
|
68.2 KB
|
The missing piece in threat intelligence.eng.json
|
2.4 MB
|
The missing piece in threat intelligence.eng.lrc
|
63.7 KB
|
The missing piece in threat intelligence.eng.srt
|
67.3 KB
|
The missing piece in threat intelligence.eng.text
|
39.7 KB
|
The missing piece in threat intelligence.eng.tsv
|
54.0 KB
|
The missing piece in threat intelligence.eng.txt
|
64.6 KB
|
The missing piece in threat intelligence.eng.vtt
|
59.3 KB
|
The Story of Cryptowall.eng.json
|
1.9 MB
|
The Story of Cryptowall.eng.lrc
|
52.7 KB
|
The Story of Cryptowall.eng.srt
|
52.7 KB
|
The Story of Cryptowall.eng.text
|
32.3 KB
|
The Story of Cryptowall.eng.tsv
|
44.1 KB
|
The Story of Cryptowall.eng.txt
|
53.4 KB
|
The Story of Cryptowall.eng.vtt
|
46.8 KB
|
Travelling to the far side of Andromeda.eng.json
|
1.6 MB
|
Travelling to the far side of Andromeda.eng.lrc
|
37.5 KB
|
Travelling to the far side of Andromeda.eng.srt
|
42.4 KB
|
Travelling to the far side of Andromeda.eng.text
|
27.6 KB
|
Travelling to the far side of Andromeda.eng.tsv
|
33.4 KB
|
Travelling to the far side of Andromeda.eng.txt
|
37.8 KB
|
Travelling to the far side of Andromeda.eng.vtt
|
38.2 KB
|
/.../Botconf 2016 presentations/
|
2016-LT01-Unprotect_Roccia.pdf
|
984.6 KB
|
2016-LT02-Osiris-Poulson.pdf
|
1.4 MB
|
2016-LT03-7547-Mertens.pdf
|
1.6 MB
|
2016-LT05-Sisyphe-AUFFRET.pdf
|
43.2 KB
|
2016-LT06-KK-e-Silva.pdf
|
728.0 KB
|
2016-LT07-Android-Botnet-Analysis-Alothman.pdf
|
3.7 MB
|
2016-LT08-Botconf2016LightningTalkMartijnGrooten.pdf
|
160.5 KB
|
2016-LT09-TrickBot-Adams.pdf
|
1.2 MB
|
2016-LT11-dotNET-sample-analysis-Rifflet.pdf
|
840.1 KB
|
INV02-Ransomware-BEEK.pdf
|
22.4 MB
|
PR01-Visiting-Bears-Den-CAMPOS.pdf
|
3.4 MB
|
PR02-LURK-KROPOTOV.pdf
|
6.8 MB
|
PR03-Browser-based-Malware-Evolution-and-Prevention-KOVALEV-SIDOROV.pdf
|
1.8 MB
|
PR04-ESOM-DNS-MANDRYSCH.pdf
|
516.6 KB
|
PR05-Vawtrak-ACIN-BHAT.pdf
|
3.8 MB
|
PR06-SnoringOptional-WC-Botconf2016.pdf
|
6.9 MB
|
PR08-MOOSE-BILODEAU-PAQUET-CLOUSTON.pdf
|
4.8 MB
|
PR09-Tracking-exploit-kits-Bambenek.pdf
|
1.7 MB
|
PR10-Improve-DDoS-Botnet-Tracking-With-Honeypots-LIU.pdf
|
697.3 KB
|
PR11-Function-Identification-and-Recovery-Signature-Tool-Villegas.pdf
|
869.0 KB
|
PR12-Sysmon-UELTSCHI.pdf
|
4.6 MB
|
PR14-Tete-aTete_with_RSA_Bots_presentation-FRIESS.pdf
|
393.5 KB
|
PR15-Takedown-ISP-QUANG-TRAN-MINH.pdf
|
449.6 KB
|
PR16-Detecting-the-Behavioral-Relationships-of-Malware-Connections-GARCIA.pdf
|
5.9 MB
|
PR17-Analysis-of-Free-Movies-and-Series-Websites-Guided-by-Users-Search-Terms-BENTHIN.pdf
|
1.1 MB
|
PR18-Nymaim-ORTEGA.pdf
|
1.1 MB
|
PR20-ISFB-Kotowicz-.pdf
|
1.1 MB
|
PR21-Preventing-File-Based-Botnet-Growth-and-Persistence-ARMOUR.pdf
|
6.4 MB
|
WS04-Getting-Your-Hands-Dirty-How-to-Analyze-the-Behavior-of-Malware-Traffic-and-Web-Connections-VALEROS-GARCIA.pdf
|
186.0 KB
|
/.../Botconf 2016 video/
|
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.mp4
|
30.6 MB
|
Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.mp4
|
18.7 MB
|
Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.mp4
|
32.5 MB
|
Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.mp4
|
23.3 MB
|
Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.mp4
|
17.6 MB
|
Function Identification and Recovery Signature Tool - Angel Villegas.mp4
|
34.0 MB
|
How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.mp4
|
21.0 MB
|
Improve DDoS Botnet Tracking With Honeypots - Ya Liu.mp4
|
20.5 MB
|
ISFB, Still Live and Kicking - Maciej Kotowicz.mp4
|
26.8 MB
|
LURK The Story about Five Years of Activity - Vladimir Kropotov.mp4
|
25.4 MB
|
MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.mp4
|
298.1 MB
|
Preventing File Based Botnet Persistence and Growth - Kurtis Armour.mp4
|
23.5 MB
|
Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.mp4
|
36.9 MB
|
Takedown client server botnets the ISP way - Quảng Trần.mp4
|
21.7 MB
|
Tracking Exploit Kits - John Bambenek.mp4
|
31.5 MB
|
Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.mp4
|
33.9 MB
|
/.../Botconf 2016 captions/
|
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.json
|
1.2 MB
|
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.lrc
|
31.7 KB
|
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.srt
|
33.4 KB
|
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.text
|
24.5 KB
|
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.tsv
|
28.7 KB
|
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.txt
|
31.9 KB
|
Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.vtt
|
30.9 KB
|
Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.json
|
894.6 KB
|
Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.lrc
|
22.6 KB
|
Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.srt
|
24.7 KB
|
Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.text
|
17.3 KB
|
Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.tsv
|
20.3 KB
|
Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.txt
|
22.8 KB
|
Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.vtt
|
22.6 KB
|
Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.json
|
2.4 MB
|
Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.lrc
|
68.5 KB
|
Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.srt
|
55.6 KB
|
Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.text
|
39.5 KB
|
Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.tsv
|
56.6 KB
|
Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.txt
|
69.7 KB
|
Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.vtt
|
50.8 KB
|
Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.json
|
1.1 MB
|
Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.lrc
|
28.9 KB
|
Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.srt
|
27.9 KB
|
Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.text
|
20.6 KB
|
Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.tsv
|
25.3 KB
|
Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.txt
|
29.2 KB
|
Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.vtt
|
25.9 KB
|
Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.json
|
1.1 MB
|
Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.lrc
|
27.5 KB
|
Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.srt
|
29.0 KB
|
Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.text
|
19.3 KB
|
Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.tsv
|
23.9 KB
|
Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.txt
|
27.9 KB
|
Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.vtt
|
26.2 KB
|
Function Identification and Recovery Signature Tool - Angel Villegas.eng.json
|
1.8 MB
|
Function Identification and Recovery Signature Tool - Angel Villegas.eng.lrc
|
46.8 KB
|
Function Identification and Recovery Signature Tool - Angel Villegas.eng.srt
|
45.1 KB
|
Function Identification and Recovery Signature Tool - Angel Villegas.eng.text
|
32.5 KB
|
Function Identification and Recovery Signature Tool - Angel Villegas.eng.tsv
|
40.8 KB
|
Function Identification and Recovery Signature Tool - Angel Villegas.eng.txt
|
47.3 KB
|
Function Identification and Recovery Signature Tool - Angel Villegas.eng.vtt
|
41.4 KB
|
How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.json
|
683.3 KB
|
How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.lrc
|
18.0 KB
|
How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.srt
|
19.2 KB
|
How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.text
|
11.7 KB
|
How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.tsv
|
15.3 KB
|
How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.txt
|
18.3 KB
|
How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.vtt
|
17.1 KB
|
Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.json
|
913.7 KB
|
Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.lrc
|
25.5 KB
|
Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.srt
|
25.3 KB
|
Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.text
|
17.1 KB
|
Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.tsv
|
21.8 KB
|
Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.txt
|
25.8 KB
|
Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.vtt
|
23.0 KB
|
ISFB, Still Live and Kicking - Maciej Kotowicz.eng.json
|
1.7 MB
|
ISFB, Still Live and Kicking - Maciej Kotowicz.eng.lrc
|
46.8 KB
|
ISFB, Still Live and Kicking - Maciej Kotowicz.eng.srt
|
49.2 KB
|
ISFB, Still Live and Kicking - Maciej Kotowicz.eng.text
|
27.0 KB
|
ISFB, Still Live and Kicking - Maciej Kotowicz.eng.tsv
|
38.6 KB
|
ISFB, Still Live and Kicking - Maciej Kotowicz.eng.txt
|
47.5 KB
|
ISFB, Still Live and Kicking - Maciej Kotowicz.eng.vtt
|
42.9 KB
|
LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.json
|
986.3 KB
|
LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.lrc
|
23.9 KB
|
LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.srt
|
26.6 KB
|
LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.text
|
18.4 KB
|
LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.tsv
|
21.5 KB
|
LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.txt
|
24.1 KB
|
LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.vtt
|
24.3 KB
|
MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.json
|
10.5 MB
|
MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.lrc
|
327.4 KB
|
MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.srt
|
246.9 KB
|
MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.text
|
167.3 KB
|
MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.tsv
|
253.7 KB
|
MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.txt
|
332.8 KB
|
MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.vtt
|
230.9 KB
|
Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.json
|
1.5 MB
|
Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.lrc
|
43.0 KB
|
Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.srt
|
36.2 KB
|
Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.text
|
26.3 KB
|
Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.tsv
|
35.8 KB
|
Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.txt
|
43.6 KB
|
Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.vtt
|
33.3 KB
|
Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.json
|
2.2 MB
|
Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.lrc
|
53.1 KB
|
Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.srt
|
63.6 KB
|
Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.text
|
41.2 KB
|
Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.tsv
|
48.2 KB
|
Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.txt
|
53.5 KB
|
Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.vtt
|
57.2 KB
|
Takedown client server botnets the ISP way - Quảng Trần.eng.json
|
960.2 KB
|
Takedown client server botnets the ISP way - Quảng Trần.eng.lrc
|
25.8 KB
|
Takedown client server botnets the ISP way - Quảng Trần.eng.srt
|
24.0 KB
|
Takedown client server botnets the ISP way - Quảng Trần.eng.text
|
18.0 KB
|
Takedown client server botnets the ISP way - Quảng Trần.eng.tsv
|
22.4 KB
|
Takedown client server botnets the ISP way - Quảng Trần.eng.txt
|
26.1 KB
|
Takedown client server botnets the ISP way - Quảng Trần.eng.vtt
|
22.3 KB
|
Tracking Exploit Kits - John Bambenek.eng.json
|
1.9 MB
|
Tracking Exploit Kits - John Bambenek.eng.lrc
|
50.9 KB
|
Tracking Exploit Kits - John Bambenek.eng.srt
|
48.5 KB
|
Tracking Exploit Kits - John Bambenek.eng.text
|
35.0 KB
|
Tracking Exploit Kits - John Bambenek.eng.tsv
|
44.3 KB
|
Tracking Exploit Kits - John Bambenek.eng.txt
|
51.5 KB
|
Tracking Exploit Kits - John Bambenek.eng.vtt
|
44.6 KB
|
Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.json
|
1.7 MB
|
Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.lrc
|
43.9 KB
|
Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.srt
|
44.7 KB
|
Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.text
|
32.8 KB
|
Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.tsv
|
39.4 KB
|
Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.txt
|
44.3 KB
|
Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.vtt
|
41.3 KB
|
/.../Botconf 2017 presentations/
|
2017_tomonaga-muda-Hunting-Attacker-Activities.pdf
|
2.1 MB
|
2017-AnthonyKasza-Formatting-for-justice.pdf
|
896.4 KB
|
2017-DanielPlohmann-Malpedia.pdf
|
1.5 MB
|
2017-Drimel-The_new_era_of_Android_Banking_Botnets.pdf
|
4.5 MB
|
2017-Eschweiler-YANT-Yet-Another-Nymaim-Talk-4.pdf
|
2.8 MB
|
2017-FelixAime_Kinghtcrawler.pdf
|
2.7 MB
|
2017-JedynakSrokosz-Use-your-enemies_-tracking-botnets-with-bots.pdf
|
9.1 MB
|
2017-KarineESilva-A-silver-path-1.pdf
|
731.3 KB
|
2017-KroustekMatulaZemek-retdec-slides-botconf-2017.pdf
|
12.6 MB
|
2017-MariaErquiaga-Malware-Uncertainty-Principle-Botconf-presentation3.pdf
|
1.3 MB
|
2017-Marinho-Exploring-a-Transient-P2P-Botnet.pdf
|
111.6 MB
|
2017-Meriot-IOT-1.pdf
|
5.6 MB
|
2017-OrEshed-MarkLechtik-get_rich_or_die_trying.pdf
|
8.4 MB
|
2017-RascagneresMaynor-Botconf_Nyetya-Final.pdf
|
11.4 MB
|
2017-Shirokova-An-overview-of-the-CMS-brute-forcing-landscape-.pdf
|
9.7 MB
|
2017-Simmons-Advanced-Threat-Hunting-4.pdf
|
5.1 MB
|
2017-VachonFaou-Stantinko.pdf
|
5.1 MB
|
DEFT_BOTCONF_2017.pdf
|
1.5 MB
|
/.../Botconf 2017 video/
|
Advanced Threat Hunting - Robert Simmons.mp4
|
27.3 MB
|
An Overview of the CMS Brute-Forcing Malware Landscape - Anna Shirokova.mp4
|
16.7 MB
|
Augmented Intelligence to Scale Humans Fighting Botnets - Amir Asiaee.mp4
|
21.2 MB
|
Automation Of Internet-Of-Things Botnets Takedown By An ISP - Sébastien Mériot.mp4
|
17.7 MB
|
How to detect watering holes - Félix Aimé.mp4
|
18.0 MB
|
Hunting Attacker Activities - Keisuke Muda - Shusei Tomonaga.mp4
|
21.5 MB
|
Malpedia A Collaborative Effort to Inventorize the Malware Landscape - Daniel Plohmann.mp4
|
36.0 MB
|
Malware Uncertainty Principle - Maria Jose Erquiaga.mp4
|
10.2 MB
|
Malware, Penny Stocks, Pharma Spam - Necurs Delivers - Jaeson Schultz.mp4
|
19.1 MB
|
PWS, Common, Ugly but Effective - Paul Jung.mp4
|
18.4 MB
|
RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.mp4
|
19.2 MB
|
The (makes me) Wannacry Investigation - Alan Neville.mp4
|
19.0 MB
|
/.../Botconf 2017 captions/
|
Advanced Threat Hunting - Robert Simmons.eng.srt
|
81.8 KB
|
An Overview of the CMS Brute-Forcing Malware Landscape - Anna Shirokova.eng.srt
|
43.1 KB
|
Augmented Intelligence to Scale Humans Fighting Botnets - Amir Asiaee.eng.srt
|
33.9 KB
|
Automation Of Internet-Of-Things Botnets Takedown By An ISP - Sébastien Mériot.eng.srt
|
31.7 KB
|
How to detect watering holes - Félix Aimé.eng.srt
|
34.7 KB
|
Hunting Attacker Activities - Keisuke Muda - Shusei Tomonaga.eng.srt
|
37.3 KB
|
Malpedia A Collaborative Effort to Inventorize the Malware Landscape - Daniel Plohmann.eng.srt
|
114.0 KB
|
Malware Uncertainty Principle - Maria Jose Erquiaga.eng.srt
|
19.5 KB
|
Malware, Penny Stocks, Pharma Spam - Necurs Delivers - Jaeson Schultz.eng.srt
|
51.3 KB
|
PWS, Common, Ugly but Effective - Paul Jung.eng.srt
|
21.8 KB
|
RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.json
|
1.5 MB
|
RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.lrc
|
36.5 KB
|
RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.srt
|
43.8 KB
|
RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.text
|
28.2 KB
|
RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.tsv
|
33.0 KB
|
RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.txt
|
36.8 KB
|
RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.vtt
|
39.4 KB
|
The (makes me) Wannacry Investigation - Alan Neville.eng.srt
|
52.6 KB
|
/.../Botconf 2018 presentations/
|
2018-A-Rebstock-how_much_should_you_pay_for_your_own_botnet.pdf
|
2.0 MB
|
2018-Aseel-Kayal-APTC23.pdf
|
4.3 MB
|
2018-C-Ibrahim-RedTeamer-2.0-1.pdf
|
1.7 MB
|
2018-D-Desai-N-Singh-T-Dewan-Stagecraft.pdf
|
1.2 MB
|
2018-Dennis-Schwarz-everything_panda_banker.pdf
|
4.3 MB
|
2018-D-Plohmann-CodeCartographersDiary.pdf
|
2.2 MB
|
2018-E-Le-Jamtel-Cryptonote-hunting-1.3.pdf
|
2.8 MB
|
2018-F-Bacurio-Junior-J-Salvio-Trickbot-The-Trick-is-On-You-presented.pdf
|
1.7 MB
|
2018-I-Kwiatowski-R-Mouchoux-Automation-and-Structured-Knowledge-in-Tactical-Threat-Intelligence.pdf
|
2.2 MB
|
2018-JM-Esparza-Internals-Spam-Distribution-Botnet_Jose-Miguel-Esparza_Botconf18_TLP_WHITE.pdf
|
3.0 MB
|
2018-J-Sirmer-A-Streda-Botception.pdf
|
822.7 KB
|
2018-J-Soucek-J-Tomanek-CollectingMaliciousParticlesFromNeutrinoBotnets.pdf
|
6.9 MB
|
2018-J-Wyke-Tracking-actors-through-their-webinjects-.pdf
|
3.2 MB
|
2018-M-Faou-J-I-Boutin-turla.pdf
|
3.8 MB
|
2018-P-Bialczak-Leaving-no-stone-unturned-in-search-of-HTTP-malware.pdf
|
398.5 KB
|
2018-R-Dumont-H-Porcher-dark_side_of_the_forsshe.pdf
|
2.2 MB
|
2018-R-Joven-Mirai-Beyond-the-Aftermath.pdf
|
3.9 MB
|
2018-R-Jullian-In-depth-Formbook-Malware-Analysis-1.pdf
|
2.4 MB
|
2018-Tom-Ueltschi-Sysmon.pdf
|
8.7 MB
|
2018-T-Wu-G-Zhao-WASM-security-analyze-And-reverse-engineering.pdf
|
1.1 MB
|
2018-Y-Ishikawa-S-Nagano-Lets-go-with-a-Go-RAT-_final.pdf
|
4.2 MB
|
2018-Y-Liu-H-Wang-HowManyMiraiVariantsAreThere_public-1.pdf
|
3.9 MB
|
/.../Botconf 2019 presentations/
|
B2019-Baier-DeStroid.pdf
|
2.5 MB
|
B2019-Bialczak-Tracking-botnets-with-Long-Term-Sandboxing.pdf
|
2.8 MB
|
B2019-Bilstein-Plohmann-YaraSignator.pdf
|
867.2 KB
|
B2019-Camastra-Guildma_-timers-send-from-hell.pdf
|
2.5 MB
|
B2019-Eremin_Bot_with_rootkit.pdf
|
1.3 MB
|
B2019-Grooten-Malspam-is-Different-Spam.pdf
|
975.2 KB
|
B2019-Harpaz-Goldberg-Tracking-at-scale.pdf
|
3.9 MB
|
B2019-Holzer-tracking_samples_on_a_budget.pdf
|
1.8 MB
|
B2019-Ishimaru-Niseki-Ogawa-Mantis.pdf
|
2.9 MB
|
B2019-Neumann-Eberhardt-the_cereals_botnet_botconf_2019_final-2.pdf
|
2.7 MB
|
B2019-OReilly-Jarvis-End-to-end-Botnet-Monitoring.pdf
|
1.3 MB
|
B2019-Shipulin-Goncharov-Finding-Neutrino-Botnet.-From-Web-Scans-to-Botnet-Architecture-1.pdf
|
15.1 MB
|
B2019-Soucek-Hornak-DemystifyingBankingTrojansFromLatinAmerica.pdf
|
8.4 MB
|
/.../Botconf 2020 presentations/
|
2020-LukaszSiewierski-The-fall-of-Domino.pdf
|
902.1 KB
|
2020-Maciej-Kotowicz-Your-aa-is-on-Fire.pdf
|
2.1 MB
|
2020-MaxKersten-Hunting-for-MageCart.pdf
|
423.4 KB
|
2020-NadlerGarzon-Inline-Detection-of-Copy-Paste-Botnet-CC.pdf
|
4.5 MB
|
2020-NadlerGarzon-Tracking-Unsafe-Services-that-are-Hosted-by-Bots-using-IP-Reputation.pdf
|
2.8 MB
|
/.../Botconf 2020 video/
|
A detailed look into the Mozi P2P IoT botnet.mp4
|
10.5 MB
|
A Proposed Civil Liability Framework for Disrupting Botnets, a particular focus on Smart Devices.mp4
|
26.9 MB
|
An overview of the Botnet Simulation Framework.mp4
|
12.3 MB
|
APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications.mp4
|
15.9 MB
|
Fluxxy Dissection.mp4
|
11.6 MB
|
Fritzfrog A Story of a Unique P2P Botnet.mp4
|
16.8 MB
|
Hunting MageCart Skimmers.mp4
|
9.9 MB
|
Hunting the Quasar Family - How to Hunt Malware Family.mp4
|
19.6 MB
|
Inline Detection of Copy-Paste Botnet C&C.mp4
|
19.5 MB
|
The fall of Domino - a preinstalled hostile downloader.mp4
|
15.7 MB
|
Tracking Unsafe Services that are Hosted by Bots using IP Reputation.mp4
|
12.5 MB
|
Turla operations from a front row seat.mp4
|
13.7 MB
|
xOSSig - Leveraging OS Diversity to Automatically Extract Malware Code Signatures.mp4
|
16.6 MB
|
Your - aaS is on fire, or how threat actors (ab)use cloud providers.mp4
|
17.9 MB
|
/.../Botconf 2020 captions/
|
A detailed look into the Mozi P2P IoT botnet.eng.srt
|
31.2 KB
|
A Proposed Civil Liability Framework for Disrupting Botnets, a particular focus on Smart Devices.eng.srt
|
52.6 KB
|
An overview of the Botnet Simulation Framework.eng.srt
|
40.2 KB
|
APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications.eng.srt
|
48.3 KB
|
Fluxxy Dissection.eng.srt
|
45.4 KB
|
Fritzfrog A Story of a Unique P2P Botnet.eng.srt
|
47.5 KB
|
Hunting MageCart Skimmers.eng.srt
|
35.0 KB
|
Hunting the Quasar Family - How to Hunt Malware Family.eng.srt
|
34.7 KB
|
Inline Detection of Copy-Paste Botnet C&C.eng.srt
|
41.7 KB
|
The fall of Domino - a preinstalled hostile downloader.eng.srt
|
42.8 KB
|
Tracking Unsafe Services that are Hosted by Bots using IP Reputation.eng.srt
|
27.0 KB
|
Turla operations from a front row seat.eng.srt
|
41.0 KB
|
xOSSig - Leveraging OS Diversity to Automatically Extract Malware Code Signatures.eng.srt
|
50.7 KB
|
Your - aaS is on fire, or how threat actors (ab)use cloud providers.eng.srt
|
49.3 KB
|
/.../Botconf 2022 presentations/
|
Botconf2022-01-YerushalmiSimonovich-2.pdf
|
4.5 MB
|
Botconf2022-03-vanderLindenKersten-2.pdf
|
696.0 KB
|
Botconf2022-04-MyrakasymovRogachev.pdf
|
8.1 MB
|
Botconf2022-06-DaihesTzaban.pdf
|
2.0 MB
|
Botconf2022-10-Regeciova.pdf
|
1.3 MB
|
Botconf2022-12-Kersten-SeeYaSharp-1.pdf
|
670.6 KB
|
Botconf2022-16-PoliakovaYuzifovich.pdf
|
17.6 MB
|
Botconf2022-17-PimentaLopez.pdf
|
1.4 MB
|
Botconf2022-18-PicadoRubio.pdf
|
2.3 MB
|
Botconf2022-19-FaouCoteCyr.pdf
|
5.0 MB
|
Botconf2022-23-DoraisMunoz.pdf
|
2.6 MB
|
Botconf2022-24-PalotayZsigovits.pdf
|
12.7 MB
|
Botconf2022-26-BrunoniDecaryHetu.pdf
|
2.1 MB
|
Botconf2022-31-Alvares.pdf
|
2.4 MB
|
Botconf2022-37-Hammou.pdf
|
1.1 MB
|
Botconf2022-39-BoeckKaruppayah.pdf
|
3.1 MB
|
Botconf2022-40-LunghiHorejsi.pdf
|
1.1 MB
|
Botconf2022-42-BarthelEydam-1.pdf
|
962.7 KB
|
Botconf2022-43-Tartare-1.pdf
|
3.9 MB
|
LT01-Botconf-2022-Finding-compromised-upl.php-devices.pdf
|
493.9 KB
|
LT02-BotConf2022_LT_Tom-Ueltschi.pdf
|
509.8 KB
|
LT03-20220428_BotConf_Twitter.pdf
|
343.7 KB
|
LT06-Botconf2022_LightningTalk_BinaryAnalysisCourse-1.pdf
|
225.5 KB
|
LT09-Botconf-2022-Hugo_RIFFLET-V2.pdf
|
290.8 KB
|
/.../Botconf 2022 video/
|
A Fresh Look Into The Underground Card Shop Ecosystem.mp4
|
33.8 MB
|
Detecting And Disrupting Compromised Devices Based On Their Communication Patterns To Legitimate Web.mp4
|
18.1 MB
|
Detecting Emerging Malware On Cloud Before Virustotal Can See It.mp4
|
41.6 MB
|
Evolution Of The Sysrv Mining Botnet.mp4
|
44.8 MB
|
Fingerprinting Bot Shops Venues, Stealers, Sellers.mp4
|
50.1 MB
|
How Formbook Became Xloader And Migrated To Macos.mp4
|
36.6 MB
|
How To Eavesdrop On Winnti In A Live Environment Using Virtual Machine Introspection (Vmi).mp4
|
40.6 MB
|
Insights And Experiences From Monitoring Multiple P2p Botnets.mp4
|
25.5 MB
|
Into The Silent Night.mp4
|
13.8 MB
|
Jumping The Air-Gap 15 Years Of Nation-State Efforts.mp4
|
33.3 MB
|
Lightning talks.mp4
|
37.1 MB
|
Operation Gamblingpuppet Analysis Of A Multiplatform Campaign Targeting Online Gambling Customers.mp4
|
34.5 MB
|
Pareto Streaming Mimicry (Sponsor Technical Talk).mp4
|
20.0 MB
|
Private Clubs For Hackers How Private Forums Shape The Malware Market.mp4
|
36.7 MB
|
Privateloader - The Malware Behind A Havoc-Wreaking Pay-Per-Install Service.mp4
|
27.6 MB
|
Proxychaos A Year-In-Review Of Microsoft Exchange Exploitation.mp4
|
36.9 MB
|
Qakbot Malware Family Evolution.mp4
|
23.9 MB
|
RTM Sink-Holing The Botnet.mp4
|
28.2 MB
|
Smoke And Fire - Smokeloader Historical Changes And Trends.mp4
|
33.0 MB
|
Suricata (In Preview For A Workshop In 2023).mp4
|
23.4 MB
|
Warning Botnet Is In Your House.mp4
|
35.0 MB
|
Yara Down The Rabbit Hole Without Slowing Down.mp4
|
27.8 MB
|
/.../Botconf 2022 captions/
|
A Fresh Look Into The Underground Card Shop Ecosystem.eng.srt
|
58.8 KB
|
Detecting And Disrupting Compromised Devices Based On Their Communication Patterns To Legitimate Web.eng.srt
|
33.9 KB
|
Detecting Emerging Malware On Cloud Before Virustotal Can See It.eng.srt
|
72.0 KB
|
Evolution Of The Sysrv Mining Botnet.eng.srt
|
79.8 KB
|
Fingerprinting Bot Shops Venues, Stealers, Sellers.eng.srt
|
108.1 KB
|
How Formbook Became Xloader And Migrated To Macos.eng.srt
|
71.6 KB
|
How To Eavesdrop On Winnti In A Live Environment Using Virtual Machine Introspection (Vmi).eng.srt
|
62.5 KB
|
Insights And Experiences From Monitoring Multiple P2p Botnets.eng.srt
|
44.3 KB
|
Into The Silent Night.eng.srt
|
25.9 KB
|
Jumping The Air-Gap 15 Years Of Nation-State Efforts.eng.srt
|
56.4 KB
|
Lightning talks.eng.srt
|
60.3 KB
|
Operation Gamblingpuppet Analysis Of A Multiplatform Campaign Targeting Online Gambling Customers.eng.srt
|
62.1 KB
|
Pareto Streaming Mimicry (Sponsor Technical Talk).eng.srt
|
33.5 KB
|
Private Clubs For Hackers How Private Forums Shape The Malware Market.eng.srt
|
60.7 KB
|
Privateloader - The Malware Behind A Havoc-Wreaking Pay-Per-Install Service.eng.srt
|
56.7 KB
|
Proxychaos A Year-In-Review Of Microsoft Exchange Exploitation.eng.srt
|
68.7 KB
|
Qakbot Malware Family Evolution.eng.srt
|
43.5 KB
|
RTM Sink-Holing The Botnet.eng.srt
|
47.6 KB
|
Smoke And Fire - Smokeloader Historical Changes And Trends.eng.srt
|
68.2 KB
|
Suricata (In Preview For A Workshop In 2023).eng.json
|
1.1 MB
|
Suricata (In Preview For A Workshop In 2023).eng.lrc
|
33.7 KB
|
Suricata (In Preview For A Workshop In 2023).eng.srt
|
25.6 KB
|
Suricata (In Preview For A Workshop In 2023).eng.text
|
18.1 KB
|
Suricata (In Preview For A Workshop In 2023).eng.tsv
|
26.8 KB
|
Suricata (In Preview For A Workshop In 2023).eng.txt
|
34.3 KB
|
Suricata (In Preview For A Workshop In 2023).eng.vtt
|
23.4 KB
|
Warning Botnet Is In Your House.eng.srt
|
63.2 KB
|
Yara Down The Rabbit Hole Without Slowing Down.eng.srt
|
50.4 KB
|
/.../Botconf 2023 presentations/
|
2023_1166_OZERY.pdf
|
1.4 MB
|
2023_1958_DAI.pdf
|
3.4 MB
|
2023_4669_SIEWIERSKI_GURTIN.pdf
|
3.2 MB
|
2023_4737_PEREZ.pdf
|
2.8 MB
|
2023_4889_DESOUZA.pdf
|
2.5 MB
|
2023_5856_LUNGHI.pdf
|
1.5 MB
|
2023_7155_KUMAR.pdf
|
4.2 MB
|
2023_8279_REGECIOVA.pdf
|
1.3 MB
|
2023_8336_SEONGSU.pdf
|
827.2 KB
|
2023_8369_MOUCHOUX.pdf
|
1.3 MB
|
2023_8532_SILLAM-1.pdf
|
4.4 MB
|
2023_9442_WAGNER-1.pdf
|
5.4 MB
|
2023_ASHOK.pdf
|
2.5 MB
|
2023_Chevalier_Couchard_When-a-botnet-cries_-detecting-botnet-infection-chains.pdf
|
4.0 MB
|
2023_FAOU_AsylumAmbuscade.pdf
|
5.6 MB
|
2023_GROOTEN-1.pdf
|
4.4 MB
|
2023_Kersten_EnterpriseMalware.pdf
|
1.2 MB
|
2023_Kersten_RTMLocker-1.pdf
|
2.2 MB
|
2023-03-CASHDOLLAR.pdf
|
2.1 MB
|
2023-10-LingmingTu.pdf
|
5.2 MB
|
2023-15-Plohmann_MCRIT.pdf
|
4.9 MB
|
2023LT01OK-Felix-Guyard.pdf
|
900.8 KB
|
2023LT02OK-Tom-Ueltschi.pdf
|
581.7 KB
|
2023LT03OK-Patrice-Auffret.pdf
|
536.4 KB
|
2023LT04OK-Eric-Leblond-Suricata-Language-Server-1.pdf
|
1.2 MB
|
2023LT05OK-Jean-Marsault-Hiding-in-plain-sight-abusing-Graph-API-for-the-win.pdf
|
395.7 KB
|
2023LT06OK-AloisDeSouza.pdf
|
6.6 MB
|
2023LT07OK-Boris-Lickindorf-Houdini.pdf
|
1.1 MB
|
2023LT09OK-Etienne-Khan.pdf
|
3.8 MB
|
2023LT10OK-Jean-Baptiste-Rouault-UYBHYS.pdf
|
694.9 KB
|
2023LT13OK-Frederic-Baguelin-The-Snake-is-in-the-Grass-Finding-Malicious-PyPI-Packages-in-the-Wi.pdf
|
3.6 MB
|
2023LT14OK-Valery-Marchive.pdf
|
1.3 MB
|
2023LT16OK-Frederic-Grelot-4.pdf
|
982.8 KB
|
BOTCONF2023_Hammou-Rodriguez.pdf
|
2.3 MB
|
BOTCONF2023_presentation_6693_VALENTINI_STRINO.pdf
|
5.6 MB
|
/.../Botconf 2023 video/
|
A dissection of the KmsdBot - Larry W. Cashdollar - Allen West.mp4
|
25.0 MB
|
A student’s guide to free and open-source enterprise level malware analysis tooling - Max Kersten.mp4
|
14.1 MB
|
Asylum Ambuscade Crimeware or cyberespionage - Matthieu Faou.mp4
|
24.9 MB
|
Cyber Swachhta Bharat- India’s answer to botnet and malware ecosystems - Pratiksha Ashok.mp4
|
31.0 MB
|
Digital threats against civil society in the rest of the world - Martijn Grooten.mp4
|
32.3 MB
|
From GhostNet to PseudoManuscrypt - The evolution of Gh0st RAT - Jorge Rodriguez - Souhail Hammou.mp4
|
30.7 MB
|
From Words to Intelligence Leveraging the Cyber Operation Constraint Principle, Natural Language.mp4
|
33.5 MB
|
Iron Tiger Enhances its TTPs and Targets Linux and MacOS Users - Daniel Lunghi.mp4
|
27.3 MB
|
Lightning Talks 2023.mp4
|
38.5 MB
|
MCRIT The MinHash-based Code Relationship & Investigation Toolkit.mp4
|
48.1 MB
|
Operation drIBAN insight from modern banking frauds behind Ramnit - Federico Valentini.mp4
|
48.4 MB
|
Perfect Smoke and Mirrors of Enemy Following Lazarus group by tracking DeathNote - Seongsu Park.mp4
|
29.3 MB
|
RAT as a Ransomware - An Hybrid Approach - Nirmal Singh - Avinash Kumar - Niraj Shivtarkar (Co-author).mp4
|
31.0 MB
|
Read The Manual Locker A Private RaaS Provider - Max 'Libra' Kersten.mp4
|
28.7 MB
|
Security Implications of QUIC - Paul Vixie.mp4
|
45.1 MB
|
Syslogk Linux Kernel Rootkit - Executing Bots via Magic Packets - David Álvarez Pérez.mp4
|
34.8 MB
|
The Case For Real Time Detection of Data Exchange Over the DNS Protocol - Yarin Ozery.mp4
|
18.7 MB
|
The Fodcha Botnets We Watched - Lingming Tu - Liu Ya.mp4
|
34.0 MB
|
The Plague of Advanced Bad Bots - Deconstructing the Malicious Bot Problem - Yohann Sillam.mp4
|
25.0 MB
|
Tracking Bumblebee’s Development - Suweera De Souza.mp4
|
28.5 MB
|
When a botnet cries detecting botnets infection chains - Erwan Chevalier - Guillaume Couchard.mp4
|
38.9 MB
|
Yara Studies A Deep Dive into Scanning Performance - Dominika Regéciová.mp4
|
34.7 MB
|
You OTA Know Combating Malicious Android System Updaters - Łukasz Siewierski - Alec Guertin.mp4
|
44.0 MB
|
/.../Botconf 2023 captions/
|
A dissection of the KmsdBot - Larry W. Cashdollar - Allen West.eng.srt
|
45.0 KB
|
A student’s guide to free and open-source enterprise level malware analysis tooling - Max Kersten.eng.srt
|
28.5 KB
|
Asylum Ambuscade Crimeware or cyberespionage - Matthieu Faou.eng.srt
|
43.5 KB
|
Cyber Swachhta Bharat- India’s answer to botnet and malware ecosystems - Pratiksha Ashok.eng.srt
|
42.6 KB
|
Digital threats against civil society in the rest of the world - Martijn Grooten.eng.srt
|
62.5 KB
|
From GhostNet to PseudoManuscrypt - The evolution of Gh0st RAT - Jorge Rodriguez - Souhail Hammou.eng.srt
|
56.8 KB
|
From Words to Intelligence Leveraging the Cyber Operation Constraint Principle, Natural Language.eng.srt
|
14.0 KB
|
Iron Tiger Enhances its TTPs and Targets Linux and MacOS Users - Daniel Lunghi.eng.srt
|
55.1 KB
|
Lightning Talks 2023.eng.srt
|
58.7 KB
|
MCRIT The MinHash-based Code Relationship & Investigation Toolkit.eng.srt
|
90.6 KB
|
Operation drIBAN insight from modern banking frauds behind Ramnit - Federico Valentini.eng.srt
|
67.5 KB
|
Perfect Smoke and Mirrors of Enemy Following Lazarus group by tracking DeathNote - Seongsu Park.eng.srt
|
54.6 KB
|
RAT as a Ransomware - An Hybrid Approach - Nirmal Singh - Avinash Kumar - Niraj Shivtarkar (Co-author).eng.srt
|
42.2 KB
|
Read The Manual Locker A Private RaaS Provider - Max 'Libra' Kersten.eng.srt
|
41.9 KB
|
Security Implications of QUIC - Paul Vixie.eng.srt
|
73.9 KB
|
Syslogk Linux Kernel Rootkit - Executing Bots via Magic Packets - David Álvarez Pérez.eng.srt
|
52.5 KB
|
The Case For Real Time Detection of Data Exchange Over the DNS Protocol - Yarin Ozery.eng.srt
|
31.8 KB
|
The Fodcha Botnets We Watched - Lingming Tu - Liu Ya.eng.srt
|
44.4 KB
|
The Plague of Advanced Bad Bots - Deconstructing the Malicious Bot Problem - Yohann Sillam.eng.srt
|
42.7 KB
|
Tracking Bumblebee’s Development - Suweera De Souza.eng.srt
|
55.5 KB
|
When a botnet cries detecting botnets infection chains - Erwan Chevalier - Guillaume Couchard.eng.srt
|
58.1 KB
|
Yara Studies A Deep Dive into Scanning Performance - Dominika Regéciová.eng.srt
|
59.7 KB
|
You OTA Know Combating Malicious Android System Updaters - Łukasz Siewierski - Alec Guertin.eng.srt
|
70.9 KB
|
/.../Botconf 2024 presentations/
|
BOTCONF2024-AimeMeslay-Unplugging-PlugX.pdf
|
2.3 MB
|
BOTCONF2024-EndersPohlmann-A-Taxonomic-Overview-of-Prevalent-Malware-Communication-Strategies.pdf
|
3.8 MB
|
BOTCONF2024-Fabian-Marquardt-TA577_Talk.pdf
|
1.8 MB
|
BOTCONF2024-Frank-Everyone-Gets-a-Web-Shell-Or-Backdooring-Web-Hosting-Companies-in-Scale.pdf
|
3.3 MB
|
BOTCONF2024-IshikawaMatsumoto-New_Modular_Malware_RatelS_Shades_of_PlugX_final.pdf
|
7.3 MB
|
BOTCONF2024-Ladutska-Korean_Android_Financial_Menace_FakeCalls_BC2024_RC.pdf
|
4.3 MB
|
BOTCONF2024-NiwaIshimaruSato-IntotheVapor_ICI.pdf
|
8.1 MB
|
BOTCONF2024-Pham-Marion.pdf
|
12.9 MB
|
BOTCONF2024-Regeciova-GenRex.pdf
|
2.1 MB
|
BOTCONF2024-SanchezMartinez-v1.0.pdf
|
6.4 MB
|
BOTCONF2024-ShamshurLadutska-Eastern-Asian-Android-Assault-FluHorse.pdf
|
2.2 MB
|
BOTCONF2024WS1-Hammou.pdf
|
1.8 MB
|
BOTCONF2024WS3-Kersten-Dotnet.pdf
|
2.1 MB
|
LT01-BotConf2024_LT_Tom-Ueltschi.pdf
|
910.8 KB
|
/.../Botconf 2024 video/
|
A Taxonomic Overview of Prevalent Malware Communication Strategies.mp4
|
25.1 MB
|
Eastern Asian Android Assault - FluHorse - Alexandr Shamshur and Raman Ladutska.mp4
|
20.2 MB
|
Evasions Fest of Korean Android Financial Menace - FakeCalls - Raman Ladutska and Bohdan Melnykov.mp4
|
29.6 MB
|
GenRex Demonstration Level Up Your Regex Game - Dominika Regéciová.mp4
|
28.5 MB
|
I'm a Bad Noodle An Analysis of Noodle RAT Shared among China nexus Groups - Hiroaki Hara.mp4
|
36.1 MB
|
IoT Malware and Rookit Detections Using Electromagnetic Insights Unveiling the Unseen.mp4
|
36.5 MB
|
Lightlight Talks - Botconf 2024.mp4
|
56.2 MB
|
LightSpy2 feature rich mobile surveillance tool set - Victor Chebyshev.mp4
|
24.8 MB
|
Malware distribution at scale - The ecosystem of TA577 - Fabian Marquardt.mp4
|
26.8 MB
|
Monitoring 1st stage samples used by APTs and crime actors using images - Jose Luis Sanchez Martinez.mp4
|
34.8 MB
|
Telegram as a C2 or a Fourfold Tale of Bad OPSEC - Pol Thill.mp4
|
21.5 MB
|
The Supershell and its widespread Botnet - Chetan Raghuprasad.mp4
|
22.6 MB
|
Unplugging PlugX Sinkholing the PlugX USB worm botnet - Félix Aimé and Charles Meslay.mp4
|
34.4 MB
|
Unveiling the Shadows The Dark Alliance between GuLoader and Remcos - Alexey Bukhteyev Arie Olshtein.mp4
|
27.3 MB
|
/.../Botconf 2024 captions/
|
A Taxonomic Overview of Prevalent Malware Communication Strategies.eng.srt
|
49.9 KB
|
Eastern Asian Android Assault - FluHorse - Alexandr Shamshur and Raman Ladutska.eng.srt
|
37.3 KB
|
Evasions Fest of Korean Android Financial Menace - FakeCalls - Raman Ladutska and Bohdan Melnykov.eng.srt
|
55.3 KB
|
GenRex Demonstration Level Up Your Regex Game - Dominika Regéciová.eng.srt
|
42.6 KB
|
I'm a Bad Noodle An Analysis of Noodle RAT Shared among China nexus Groups - Hiroaki Hara.eng.srt
|
60.2 KB
|
IoT Malware and Rookit Detections Using Electromagnetic Insights Unveiling the Unseen.eng.srt
|
54.6 KB
|
Lightlight Talks - Botconf 2024.eng.srt
|
66.9 KB
|
LightSpy2 feature rich mobile surveillance tool set - Victor Chebyshev.eng.srt
|
40.9 KB
|
Malware distribution at scale - The ecosystem of TA577 - Fabian Marquardt.eng.srt
|
45.4 KB
|
Monitoring 1st stage samples used by APTs and crime actors using images - Jose Luis Sanchez Martinez.eng.srt
|
60.7 KB
|
Telegram as a C2 or a Fourfold Tale of Bad OPSEC - Pol Thill.eng.srt
|
46.4 KB
|
The Supershell and its widespread Botnet - Chetan Raghuprasad.eng.srt
|
38.9 KB
|
Unplugging PlugX Sinkholing the PlugX USB worm botnet - Félix Aimé and Charles Meslay.eng.srt
|
46.5 KB
|
Unveiling the Shadows The Dark Alliance between GuLoader and Remcos - Alexey Bukhteyev Arie Olshtein.eng.srt
|
46.0 KB
|
Total files 970
|