FileMood

Download Botconf

Botconf

Name

Botconf

  DOWNLOAD Copy Link

Trouble downloading? see How To

Total Size

6.1 GB

Total Files

970

Hash

A86E9F2B0175F5980CCDAB459794A7C3F3134E05

/

Botconf 2013 poster.png

550.4 KB

Botconf 2014 poster.jpg

975.6 KB

Botconf 2015 poster.png

3.3 MB

Botconf 2016 poster.png

441.7 KB

Botconf 2017 poster.png

1.5 MB

Botconf 2018 poster.png

8.0 MB

Botconf 2019 poster.jpg

703.7 KB

Botconf 2020 poster.png

1.0 MB

Botconf 2022 poster.png

2.8 MB

Botconf 2023 poster.png

840.0 KB

Botconf 2024 poster.png

567.0 KB

Botconf logo.png

186.4 KB

Botconf thank you.txt

1.1 KB

HEADER.md

0.7 KB

/.../Botconf 2013 presentations/

01-UlrichSeldeslachts-ACDC-1.pdf

2.2 MB

02-BankingTrojans-ThomasSiebert-1.pdf

2.2 MB

03-JessadelaTorre-SpamBot-1.pdf

2.3 MB

05-Coreflood-OguzKaanPehlivan-1.pdf

212.7 KB

06-VasileiosFriligkos-Correlation-1.pdf

554.3 KB

07-CyberIntelligence-EnricoBranca.pdf

798.6 KB

08-Zombies-in-your-browser.pdf

1.8 MB

09-EtienneStalmans.pdf

4.1 MB

10-SebastienDuquette-Cdorked-and-Home.pdf

2.1 MB

11-MaciejKotowicz-MalwareCalling.pdf

690.7 KB

12-IvanFontarensky-Disass-2.pdf

428.2 KB

13-ThanhDinhTa.pdf

369.1 KB

14-DhiaMahjoub-HendrikAdrian-Kelihos.pdf

3.0 MB

15-JulienLavesque-Perdix.pdf

3.0 MB

16-PasqualeStirparo-ParticipatoryHoneypots.pdf

2.2 MB

17-TomUeltschi-Ponmocup-Hunter.pdf

5.3 MB

18-DavidDecaryHetu-ForumReputation.pdf

556.5 KB

19-PaulRascagneres.pdf

653.9 KB

20-JaapvOss-Europol.pdf

2.1 MB

21-ThomasBarabosch-GeneralPurposeLab.pdf

2.5 MB

22-RonanMouchoux-DNSResolutionTrafficAnalysis.pdf

4.9 MB

23-SebastienLarinier-GuillaumeArcas-ExploitKrawler.pdf

2.4 MB

24-JasonJones-BladeRunner-1.pdf

6.6 MB

25-ThomasChopiteaMalcon.pdf

4.5 MB

/.../Botconf 2013 video/

Botconf 2013 live stream.mp4

3.1 MB

David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.mp4

24.8 MB

Enrico Branca - Using cyber intelligence to detect and localize botnets.mp4

18.2 MB

Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.mp4

33.3 MB

Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.mp4

26.4 MB

Ivan Fontarensky - Disass.mp4

9.3 MB

Jaap van Oss - Europol and European law enforcement action against botnets.mp4

32.2 MB

Jason Jones - BladeRunner - Adventures in Tracking Botnets.mp4

39.3 MB

Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.mp4

17.1 MB

Maciej Kotowicz - Malware Calling.mp4

16.8 MB

Paul Rascagne - APT1 - Technical Backstage.mp4

28.0 MB

Prakhar Prasad and Himanshu Sharma - Zombies in your browser.mp4

15.8 MB

Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.mp4

24.8 MB

S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.mp4

37.7 MB

S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.mp4

30.9 MB

Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.mp4

13.3 MB

Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.mp4

32.8 MB

Thomas Siebert - Advanced Techniques in Modern Banking Trojans.mp4

25.2 MB

Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.mp4

47.8 MB

Vasileios Friligkos - Back to life, back to correlation.mp4

11.7 MB

/.../Botconf 2013 captions/

Botconf 2013 live stream.eng.json

0.0 KB

Botconf 2013 live stream.eng.lrc

0.0 KB

Botconf 2013 live stream.eng.srt

0.0 KB

Botconf 2013 live stream.eng.text

0.0 KB

Botconf 2013 live stream.eng.tsv

0.0 KB

Botconf 2013 live stream.eng.txt

0.0 KB

Botconf 2013 live stream.eng.vtt

0.0 KB

David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.json

1.8 MB

David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.lrc

46.1 KB

David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.srt

42.6 KB

David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.text

32.9 KB

David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.tsv

40.4 KB

David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.txt

46.6 KB

David D-He - Reputation-based Life-course Trajectories of Illicit Forum Members.eng.vtt

39.8 KB

Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.json

1.1 MB

Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.lrc

30.1 KB

Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.srt

31.7 KB

Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.text

18.7 KB

Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.tsv

25.2 KB

Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.txt

30.6 KB

Enrico Branca - Using cyber intelligence to detect and localize botnets.eng.vtt

28.0 KB

Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.json

2.4 MB

Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.lrc

65.3 KB

Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.srt

60.2 KB

Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.text

41.3 KB

Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.tsv

55.3 KB

Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.txt

66.3 KB

Etienne Stalmans - Spatial Statistics as a Metric for Detecting Botnet C2 Servers.eng.vtt

54.7 KB

Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.json

1.5 MB

Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.lrc

38.8 KB

Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.srt

45.2 KB

Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.text

25.4 KB

Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.tsv

33.2 KB

Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.txt

39.3 KB

Hendrik Adrian and Dhia Mahjoub - The power of a team work - Management of Dissecting a Fast Flux Botnet, OP-Kelihos.eng.vtt

39.6 KB

Ivan Fontarensky - Disass.eng.json

469.7 KB

Ivan Fontarensky - Disass.eng.lrc

12.9 KB

Ivan Fontarensky - Disass.eng.srt

12.4 KB

Ivan Fontarensky - Disass.eng.text

7.5 KB

Ivan Fontarensky - Disass.eng.tsv

10.3 KB

Ivan Fontarensky - Disass.eng.txt

13.1 KB

Ivan Fontarensky - Disass.eng.vtt

11.1 KB

Jaap van Oss - Europol and European law enforcement action against botnets.eng.json

1.5 MB

Jaap van Oss - Europol and European law enforcement action against botnets.eng.lrc

41.1 KB

Jaap van Oss - Europol and European law enforcement action against botnets.eng.srt

40.2 KB

Jaap van Oss - Europol and European law enforcement action against botnets.eng.text

28.1 KB

Jaap van Oss - Europol and European law enforcement action against botnets.eng.tsv

35.6 KB

Jaap van Oss - Europol and European law enforcement action against botnets.eng.txt

41.6 KB

Jaap van Oss - Europol and European law enforcement action against botnets.eng.vtt

36.7 KB

Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.json

2.8 MB

Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.lrc

74.6 KB

Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.srt

67.1 KB

Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.text

46.2 KB

Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.tsv

63.2 KB

Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.txt

75.7 KB

Jason Jones - BladeRunner - Adventures in Tracking Botnets.eng.vtt

61.0 KB

Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.json

763.8 KB

Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.lrc

21.1 KB

Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.srt

19.5 KB

Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.text

13.9 KB

Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.tsv

17.9 KB

Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.txt

21.4 KB

Julien Lavesque - Perdix - a framework for realtime behavioral evaluation of security threats in cloud computing environment.eng.vtt

17.9 KB

Maciej Kotowicz - Malware Calling.eng.json

605.0 KB

Maciej Kotowicz - Malware Calling.eng.lrc

15.0 KB

Maciej Kotowicz - Malware Calling.eng.srt

16.8 KB

Maciej Kotowicz - Malware Calling.eng.text

10.8 KB

Maciej Kotowicz - Malware Calling.eng.tsv

13.1 KB

Maciej Kotowicz - Malware Calling.eng.txt

15.2 KB

Maciej Kotowicz - Malware Calling.eng.vtt

15.1 KB

Paul Rascagne - APT1 - Technical Backstage.eng.json

1.1 MB

Paul Rascagne - APT1 - Technical Backstage.eng.lrc

26.9 KB

Paul Rascagne - APT1 - Technical Backstage.eng.srt

30.2 KB

Paul Rascagne - APT1 - Technical Backstage.eng.text

18.4 KB

Paul Rascagne - APT1 - Technical Backstage.eng.tsv

23.2 KB

Paul Rascagne - APT1 - Technical Backstage.eng.txt

27.2 KB

Paul Rascagne - APT1 - Technical Backstage.eng.vtt

26.9 KB

Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.json

792.2 KB

Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.lrc

22.9 KB

Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.srt

21.3 KB

Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.text

13.1 KB

Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.tsv

18.5 KB

Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.txt

23.2 KB

Prakhar Prasad and Himanshu Sharma - Zombies in your browser.eng.vtt

18.9 KB

Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.json

897.0 KB

Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.lrc

22.0 KB

Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.srt

24.1 KB

Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.text

16.7 KB

Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.tsv

19.7 KB

Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.txt

22.2 KB

Ronan Mouchoux - DNS Resolution Traffic Analysis Applied to Bot Detection.eng.vtt

22.0 KB

S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.json

2.0 MB

S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.lrc

50.9 KB

S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.srt

53.1 KB

S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.text

37.3 KB

S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.tsv

45.3 KB

S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.txt

51.5 KB

S Duquette - The Home and CDorked campaigns - Widespread Malicious Modification of Webservers for Mass Malware Distribution.eng.vtt

48.6 KB

S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.json

1.1 MB

S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.lrc

28.1 KB

S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.srt

27.4 KB

S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.text

17.9 KB

S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.tsv

23.6 KB

S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.txt

28.5 KB

S Larinier and Guillaume Arcas - Exploit Krawler - New Weapon againt Exploits Kits.eng.vtt

24.7 KB

Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.json

515.8 KB

Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.lrc

14.1 KB

Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.srt

13.7 KB

Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.text

9.1 KB

Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.tsv

11.8 KB

Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.txt

14.3 KB

Thanh Dinh Ta - Efficient Program Exploration by Input Fuzzing.eng.vtt

12.5 KB

Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.json

1.9 MB

Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.lrc

50.8 KB

Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.srt

46.6 KB

Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.text

30.7 KB

Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.tsv

42.2 KB

Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.txt

51.5 KB

Thomas Chopitea - The hunter becomes the hunted - analyzing network traffic to track down botnets.eng.vtt

42.0 KB

Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.json

1.5 MB

Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.lrc

42.1 KB

Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.srt

39.1 KB

Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.text

26.9 KB

Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.tsv

35.6 KB

Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.txt

42.7 KB

Thomas Siebert - Advanced Techniques in Modern Banking Trojans.eng.vtt

35.6 KB

Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.json

2.3 MB

Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.lrc

57.6 KB

Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.srt

63.2 KB

Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.text

42.0 KB

Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.tsv

51.3 KB

Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.txt

58.2 KB

Tom Ueltschi - My Name is Hunter, Ponmocup Hunter.eng.vtt

57.2 KB

Vasileios Friligkos - Back to life, back to correlation.eng.json

836.6 KB

Vasileios Friligkos - Back to life, back to correlation.eng.lrc

23.2 KB

Vasileios Friligkos - Back to life, back to correlation.eng.srt

22.4 KB

Vasileios Friligkos - Back to life, back to correlation.eng.text

15.0 KB

Vasileios Friligkos - Back to life, back to correlation.eng.tsv

19.5 KB

Vasileios Friligkos - Back to life, back to correlation.eng.txt

23.5 KB

Vasileios Friligkos - Back to life, back to correlation.eng.vtt

20.3 KB

/.../Botconf 2014 presentations/

2014-1.2-Keynote-United-Kingdom-National-crime-agency-on-botnet-takedowns.pdf

11.0 MB

2014-1.3-Semantic-Exploration-of-Binaries.pdf

745.9 KB

2014-1.5-The-Many-Faces-of-Mevade.pdf

13.3 MB

2014-1.6-Splicing-and-Dicing-2014-Examining-this-Years-Botnet-Attack-Trends1.pdf

3.0 MB

2014-1.7-Virus-Tracker.pdf

1.5 MB

2014-1.8-How-to-Dismantle-a-Botnet-the-Legal-Behind-the-Scenes.pdf

920.0 KB

2014-2.1-Workshop-Feedback-on-Windbg-Usage.pdf

1.2 MB

2014-2.2-A-Timeline-of-Mobile-Botnets.pdf

6.3 MB

2014-2.2-A-Timeline-of-Mobile-Botnets-PAPER.pdf

1.5 MB

2014-2.4-CONDENSER-A-Graph-Based-Approach-for-Detecting-Botnets.pdf

2.3 MB

2014-2.4-CONDENSER-A-Graph-Based-Approach-for-Detecting-Botnets-PAPER.pdf

172.0 KB

2014-2.6-Middle-Income-Malware-Actors-in-Poland-VBKlip-and-Beyond.pdf

1.9 MB

2014-2.7-Bypassing-Sandboxes-for-Fun.pdf

2.2 MB

2014-2.9-The-Russian-DDoS-One-Booters-to-Botnets.pdf

28.7 MB

2014-2.10-Chinese-Chicken-Multiplatform-DDoS-Botnets.pdf

2.4 MB

2014-2.11-Ponmocup-Hunter-2.0-The-Sequel.pdf

2.8 MB

2014-3.1-A-New-Look-at-Fast-Flux-Proxy-Networks.pdf

9.9 MB

2014-3.3-DNS-Analytics-Case-Study.pdf

3.2 MB

2014-3.4-Keynote-A-tour-in-the-Analysis-of-X86-Botnets-at-loria.fr.pdf

1.8 MB

2014-3.6-ZeuS-Meets-VM-The-Story-so-Far.pdf

6.0 MB

2014-LT1-5-Martijn-Grooten-Qakbot.pdf

248.4 KB

2014-LT2-1-Lukasz-Siewierski-Somehow-Unusual-Android-Malware-Sample.pdf

321.2 KB

2014-LT2-5-Maxime-Morin-Radare2.pdf

1.4 MB

/.../Botconf 2014 video/

Dennis Schwarz - The Russian DDoS One Booters to Botnets.mp4

23.6 MB

Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.mp4

21.9 MB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.mp4

26.5 MB

Osama Kamal - DNS Analytics, Case Study.mp4

10.8 MB

Paul Jung - Bypassing Sandboxes for Fun.mp4

21.6 MB

Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.mp4

20.2 MB

Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.mp4

23.8 MB

Peter Kleissner - Virus Tracker.mp4

33.8 MB

/.../Botconf 2014 captions/

Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.json

1.4 MB

Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.lrc

37.3 KB

Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.srt

36.8 KB

Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.text

26.0 KB

Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.tsv

32.5 KB

Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.txt

37.8 KB

Dennis Schwarz - The Russian DDoS One Booters to Botnets.eng.vtt

33.7 KB

Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.json

782.2 KB

Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.lrc

20.4 KB

Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.srt

18.9 KB

Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.text

14.3 KB

Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.tsv

17.5 KB

Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.txt

20.6 KB

Karine e Silva - How to Dismantle a Botnet - the Legal Behind the Scenes.eng.vtt

17.6 KB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.json

1.9 MB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.lrc

53.0 KB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.srt

45.4 KB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.text

31.6 KB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.tsv

44.1 KB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.txt

53.8 KB

Martijn Grooten and Joao Gouveia - The Many Faces of Mevade.eng.vtt

41.4 KB

Osama Kamal - DNS Analytics, Case Study.eng.json

671.0 KB

Osama Kamal - DNS Analytics, Case Study.eng.lrc

17.0 KB

Osama Kamal - DNS Analytics, Case Study.eng.srt

19.2 KB

Osama Kamal - DNS Analytics, Case Study.eng.text

12.1 KB

Osama Kamal - DNS Analytics, Case Study.eng.tsv

14.7 KB

Osama Kamal - DNS Analytics, Case Study.eng.txt

17.2 KB

Osama Kamal - DNS Analytics, Case Study.eng.vtt

17.2 KB

Paul Jung - Bypassing Sandboxes for Fun.eng.json

1.4 MB

Paul Jung - Bypassing Sandboxes for Fun.eng.lrc

35.9 KB

Paul Jung - Bypassing Sandboxes for Fun.eng.srt

41.2 KB

Paul Jung - Bypassing Sandboxes for Fun.eng.text

23.2 KB

Paul Jung - Bypassing Sandboxes for Fun.eng.tsv

30.4 KB

Paul Jung - Bypassing Sandboxes for Fun.eng.txt

36.4 KB

Paul Jung - Bypassing Sandboxes for Fun.eng.vtt

36.1 KB

Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.json

776.7 KB

Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.lrc

20.1 KB

Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.srt

22.4 KB

Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.text

13.9 KB

Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.tsv

17.4 KB

Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.txt

20.3 KB

Pedro Camelo & Joao Moura - CONDENSER - A Graph-Based Approach for Detecting Botnets.eng.vtt

20.0 KB

Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.json

1.1 MB

Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.lrc

29.7 KB

Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.srt

32.1 KB

Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.text

21.7 KB

Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.tsv

26.2 KB

Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.txt

30.0 KB

Peter Kalnai & Jaromir Horejsi - Chinese Chicken - Multiplatform DDoS Botnets.eng.vtt

29.2 KB

Peter Kleissner - Virus Tracker.eng.json

2.3 MB

Peter Kleissner - Virus Tracker.eng.lrc

65.2 KB

Peter Kleissner - Virus Tracker.eng.srt

58.8 KB

Peter Kleissner - Virus Tracker.eng.text

40.2 KB

Peter Kleissner - Virus Tracker.eng.tsv

54.8 KB

Peter Kleissner - Virus Tracker.eng.txt

66.2 KB

Peter Kleissner - Virus Tracker.eng.vtt

53.4 KB

/.../Botconf 2015 presentations/

2.htm

17.6 KB

3.htm

19.5 KB

4.htm

17.9 KB

7XM167MJ.htm

28.9 KB

a-moose-once-bit-my-honeypot.htm

35.3 KB

CJYV2O6G.htm

59.9 KB

dga-domain-classification.htm

70.1 KB

OK-K01-Margarita-Louca-Botnet-takedowns-cooperation.pdf

1.8 MB

OK-LT01-Kurtis-ArmourBrowser-and-Environment-Hardening.pdf

912.8 KB

OK-LT02-Christ-Dietrich-Stegoloader.pdf

138.9 KB

OK-LT05-Martijn-Grooten-The-State-of-Spam-in-2015.pdf

225.5 KB

OK-LT06-Hugo-Rifflet-Python-log-parser-Flask-Log-Map.pdf

543.9 KB

OK-LT07-Robin-David-Dynamic-symbolic-execution-for-malware-reverse-engineering.pdf

329.8 KB

OK-LT08-Roy-Firestein-Cymon.pdf

1.4 MB

OK-LT09-Xavier-Mertens-Automatic-MIME-attachments-triage.pdf

534.4 KB

OK-LT10-Wayne-Crowder-Wrestling-elephants-Tackling-malware-research-issues.pdf

858.2 KB

OK-LT11-Johanne-Ulloa-Nolimitsecu.pdf

1.1 MB

OK-P01-Maarten-van-Dantzig-Yonathan-Klijnsma-Ponmocup.pdf

12.5 MB

OK-P03-Frank-Denis-The-missing-piece-in-threat-intelligence.pdf

15.8 MB

OK-P04-Marc-Doudiet-Honey-Where-is-my-PoS.pdf

1.3 MB

OK-P05-John-Bambenek-Takedowns-Case-studies-and-what-we-all-could-be-doing-better.pdf

3.4 MB

OK-P06-Plohmann-DGArchive.pdf

739.9 KB

OK-P07-Jose-Esparza-Travelling-to-the-far-side-of-Andromeda-2.pdf

1.4 MB

OK-P08-Mikhail-Kuzin-Nikita-Buchka-Whose-phone-is-in-your-pocket.pdf

2.4 MB

OK-P09-Malatras_Beslay_Botconf2015.pdf

986.9 KB

OK-P10-Paul-Jung-Box-BotNets.pdf

3.9 MB

OK-P11-Matthieu-Kaczmarek-Malware-Instrumentation-Application-to-Regin-Analysis.pdf

1.2 MB

OK-P12-Mark-Graham-Practical-Experiences-of-Building-an-IPFIX-Based-Open-Source-Botnet-Detector.pdf

1.5 MB

OK-P13-Liu-Ya-Automatically-Classify-Unknown-Bots-by-The-Register-Messages.pdf

926.3 KB

OK-P14-Yonathan-Klijnsma-The-Story-of-CryptoWall-a-historical-analysis-of-a-large-scale-cryptographic-ransomware-threat.pdf

31.0 MB

OK-P15-Renaud-Bidou-Powered-by-Javascript.pdf

3.3 MB

OK-P17-Chaouki-Kasmi-Jose-Lopes-Esteves-Philippe-Valembois-Air-Gap-Command-Control-IEMI.pdf

1.9 MB

OK-P18-Kleissner-Sality.pdf

1.6 MB

OK-P19-Olivier-Bilodeau-A-moose-once-bit-my-honeypot.pdf

7.1 MB

OK-P20-Thomas-Barabosch-Behavior-driven-development-in-malware-analysis.pdf

2.2 MB

OK-S01-Alex-Chailytko-Alex-Trafimcuk-DGA-clustering-and-analysis-mastering-modern-evolving-threats.pdf

604.9 KB

OK-S02-Zoltan-Balazs-Sandbox_mapping_botconf.pdf

1.4 MB

OK-S04-Veronica-Valeros-Make-it-count_v3.pdf

3.6 MB

OK-S05-Josiah-Hagen-Building-a-better-botnet-DGA-mousetrap-separating-mice-rats-and-cheese-in-DNS-data.pdf

2.2 MB

/.../Botconf 2015 video/

A moose once bit my honeypot - A story of an embedded Linux botnet.mp4

77.9 MB

Air-gap limitations and bypass techniques.mp4

85.1 MB

Automatically classifying unknown bots by the register messages.mp4

35.5 MB

Behavior driven development in malware analysis.mp4

49.3 MB

BoxBotNet.mp4

51.7 MB

Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.mp4

30.7 MB

Building a hybrid experimental platform for mobile botnet research.mp4

54.6 MB

DGA clustering and analysis mastering modern, evolving threats.mp4

32.2 MB

DGArchive - A deep dive into domain generating malware.mp4

93.4 MB

Inside traffic exchange networks.mp4

50.4 MB

Make It count An analysis of a brute forcing botnet.mp4

36.0 MB

Malware Instrumentation Application to Regin Analysis.mp4

95.4 MB

Mobile botnet malware collection.mp4

48.6 MB

Mostly Polish threat landscape not only VBKlip.mp4

48.2 MB

Powered by JavaScript.mp4

51.4 MB

Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.mp4

77.0 MB

Sality.mp4

65.0 MB

Sandbox detection for the masses leak, abuse, test.mp4

38.0 MB

Takedowns case studies and what we all could be doing better.mp4

119.1 MB

The missing piece in threat intelligence.mp4

106.6 MB

The Story of Cryptowall.mp4

59.9 MB

Travelling to the far side of Andromeda.mp4

52.7 MB

/.../Botconf 2015 captions/

A moose once bit my honeypot - A story of an embedded Linux botnet.eng.json

2.3 MB

A moose once bit my honeypot - A story of an embedded Linux botnet.eng.lrc

66.9 KB

A moose once bit my honeypot - A story of an embedded Linux botnet.eng.srt

53.2 KB

A moose once bit my honeypot - A story of an embedded Linux botnet.eng.text

36.5 KB

A moose once bit my honeypot - A story of an embedded Linux botnet.eng.tsv

54.3 KB

A moose once bit my honeypot - A story of an embedded Linux botnet.eng.txt

68.0 KB

A moose once bit my honeypot - A story of an embedded Linux botnet.eng.vtt

48.2 KB

Air-gap limitations and bypass techniques.eng.json

1.6 MB

Air-gap limitations and bypass techniques.eng.lrc

43.2 KB

Air-gap limitations and bypass techniques.eng.srt

42.8 KB

Air-gap limitations and bypass techniques.eng.text

30.8 KB

Air-gap limitations and bypass techniques.eng.tsv

38.1 KB

Air-gap limitations and bypass techniques.eng.txt

43.7 KB

Air-gap limitations and bypass techniques.eng.vtt

39.4 KB

Automatically classifying unknown bots by the register messages.eng.json

733.7 KB

Automatically classifying unknown bots by the register messages.eng.lrc

20.4 KB

Automatically classifying unknown bots by the register messages.eng.srt

22.5 KB

Automatically classifying unknown bots by the register messages.eng.text

14.3 KB

Automatically classifying unknown bots by the register messages.eng.tsv

17.7 KB

Automatically classifying unknown bots by the register messages.eng.txt

20.7 KB

Automatically classifying unknown bots by the register messages.eng.vtt

20.2 KB

Behavior driven development in malware analysis.eng.json

1.5 MB

Behavior driven development in malware analysis.eng.lrc

40.9 KB

Behavior driven development in malware analysis.eng.srt

35.8 KB

Behavior driven development in malware analysis.eng.text

25.6 KB

Behavior driven development in malware analysis.eng.tsv

34.5 KB

Behavior driven development in malware analysis.eng.txt

41.5 KB

Behavior driven development in malware analysis.eng.vtt

32.8 KB

BoxBotNet.eng.json

1.3 MB

BoxBotNet.eng.lrc

33.7 KB

BoxBotNet.eng.srt

38.5 KB

BoxBotNet.eng.text

20.4 KB

BoxBotNet.eng.tsv

28.0 KB

BoxBotNet.eng.txt

34.2 KB

BoxBotNet.eng.vtt

33.3 KB

Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.json

824.5 KB

Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.lrc

22.0 KB

Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.srt

21.2 KB

Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.text

15.8 KB

Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.tsv

19.1 KB

Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.txt

22.3 KB

Building a better botnet DGA mousetrap separating mice, rats and cheese in DNS data.eng.vtt

19.7 KB

Building a hybrid experimental platform for mobile botnet research.eng.json

1.7 MB

Building a hybrid experimental platform for mobile botnet research.eng.lrc

52.9 KB

Building a hybrid experimental platform for mobile botnet research.eng.srt

38.3 KB

Building a hybrid experimental platform for mobile botnet research.eng.text

29.0 KB

Building a hybrid experimental platform for mobile botnet research.eng.tsv

42.8 KB

Building a hybrid experimental platform for mobile botnet research.eng.txt

53.9 KB

Building a hybrid experimental platform for mobile botnet research.eng.vtt

35.5 KB

DGA clustering and analysis mastering modern, evolving threats.eng.json

1.1 MB

DGA clustering and analysis mastering modern, evolving threats.eng.lrc

30.6 KB

DGA clustering and analysis mastering modern, evolving threats.eng.srt

29.6 KB

DGA clustering and analysis mastering modern, evolving threats.eng.text

19.7 KB

DGA clustering and analysis mastering modern, evolving threats.eng.tsv

25.8 KB

DGA clustering and analysis mastering modern, evolving threats.eng.txt

31.0 KB

DGA clustering and analysis mastering modern, evolving threats.eng.vtt

26.8 KB

DGArchive - A deep dive into domain generating malware.eng.json

2.9 MB

DGArchive - A deep dive into domain generating malware.eng.lrc

85.5 KB

DGArchive - A deep dive into domain generating malware.eng.srt

67.7 KB

DGArchive - A deep dive into domain generating malware.eng.text

47.5 KB

DGArchive - A deep dive into domain generating malware.eng.tsv

69.9 KB

DGArchive - A deep dive into domain generating malware.eng.txt

86.9 KB

DGArchive - A deep dive into domain generating malware.eng.vtt

61.7 KB

Inside traffic exchange networks.eng.json

1.7 MB

Inside traffic exchange networks.eng.lrc

48.4 KB

Inside traffic exchange networks.eng.srt

41.8 KB

Inside traffic exchange networks.eng.text

26.9 KB

Inside traffic exchange networks.eng.tsv

39.4 KB

Inside traffic exchange networks.eng.txt

49.2 KB

Inside traffic exchange networks.eng.vtt

37.5 KB

Make It count An analysis of a brute forcing botnet.eng.json

929.3 KB

Make It count An analysis of a brute forcing botnet.eng.lrc

22.6 KB

Make It count An analysis of a brute forcing botnet.eng.srt

25.6 KB

Make It count An analysis of a brute forcing botnet.eng.text

17.4 KB

Make It count An analysis of a brute forcing botnet.eng.tsv

20.3 KB

Make It count An analysis of a brute forcing botnet.eng.txt

22.8 KB

Make It count An analysis of a brute forcing botnet.eng.vtt

23.3 KB

Malware Instrumentation Application to Regin Analysis.eng.json

1.5 MB

Malware Instrumentation Application to Regin Analysis.eng.lrc

46.1 KB

Malware Instrumentation Application to Regin Analysis.eng.srt

37.2 KB

Malware Instrumentation Application to Regin Analysis.eng.text

21.9 KB

Malware Instrumentation Application to Regin Analysis.eng.tsv

36.1 KB

Malware Instrumentation Application to Regin Analysis.eng.txt

47.0 KB

Malware Instrumentation Application to Regin Analysis.eng.vtt

32.7 KB

Mobile botnet malware collection.eng.json

880.4 KB

Mobile botnet malware collection.eng.lrc

24.3 KB

Mobile botnet malware collection.eng.srt

23.9 KB

Mobile botnet malware collection.eng.text

15.8 KB

Mobile botnet malware collection.eng.tsv

20.5 KB

Mobile botnet malware collection.eng.txt

24.6 KB

Mobile botnet malware collection.eng.vtt

21.6 KB

Mostly Polish threat landscape not only VBKlip.eng.json

1.1 MB

Mostly Polish threat landscape not only VBKlip.eng.lrc

27.2 KB

Mostly Polish threat landscape not only VBKlip.eng.srt

27.8 KB

Mostly Polish threat landscape not only VBKlip.eng.text

21.3 KB

Mostly Polish threat landscape not only VBKlip.eng.tsv

24.7 KB

Mostly Polish threat landscape not only VBKlip.eng.txt

27.5 KB

Mostly Polish threat landscape not only VBKlip.eng.vtt

26.0 KB

Powered by JavaScript.eng.json

1.5 MB

Powered by JavaScript.eng.lrc

38.2 KB

Powered by JavaScript.eng.srt

44.4 KB

Powered by JavaScript.eng.text

24.8 KB

Powered by JavaScript.eng.tsv

32.4 KB

Powered by JavaScript.eng.txt

38.7 KB

Powered by JavaScript.eng.vtt

38.9 KB

Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.json

1.8 MB

Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.lrc

44.1 KB

Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.srt

49.1 KB

Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.text

32.9 KB

Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.tsv

39.5 KB

Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.txt

44.5 KB

Practical Experiences of Building an IPFIX Based Open Source Botnet Detector.eng.vtt

44.5 KB

Sality.eng.json

1.5 MB

Sality.eng.lrc

38.7 KB

Sality.eng.srt

39.5 KB

Sality.eng.text

25.8 KB

Sality.eng.tsv

33.3 KB

Sality.eng.txt

39.2 KB

Sality.eng.vtt

35.6 KB

Sandbox detection for the masses leak, abuse, test.eng.json

746.0 KB

Sandbox detection for the masses leak, abuse, test.eng.lrc

18.8 KB

Sandbox detection for the masses leak, abuse, test.eng.srt

21.0 KB

Sandbox detection for the masses leak, abuse, test.eng.text

14.3 KB

Sandbox detection for the masses leak, abuse, test.eng.tsv

16.8 KB

Sandbox detection for the masses leak, abuse, test.eng.txt

18.9 KB

Sandbox detection for the masses leak, abuse, test.eng.vtt

19.2 KB

Takedowns case studies and what we all could be doing better.eng.json

2.9 MB

Takedowns case studies and what we all could be doing better.eng.lrc

69.7 KB

Takedowns case studies and what we all could be doing better.eng.srt

74.8 KB

Takedowns case studies and what we all could be doing better.eng.text

51.5 KB

Takedowns case studies and what we all could be doing better.eng.tsv

62.1 KB

Takedowns case studies and what we all could be doing better.eng.txt

70.4 KB

Takedowns case studies and what we all could be doing better.eng.vtt

68.2 KB

The missing piece in threat intelligence.eng.json

2.4 MB

The missing piece in threat intelligence.eng.lrc

63.7 KB

The missing piece in threat intelligence.eng.srt

67.3 KB

The missing piece in threat intelligence.eng.text

39.7 KB

The missing piece in threat intelligence.eng.tsv

54.0 KB

The missing piece in threat intelligence.eng.txt

64.6 KB

The missing piece in threat intelligence.eng.vtt

59.3 KB

The Story of Cryptowall.eng.json

1.9 MB

The Story of Cryptowall.eng.lrc

52.7 KB

The Story of Cryptowall.eng.srt

52.7 KB

The Story of Cryptowall.eng.text

32.3 KB

The Story of Cryptowall.eng.tsv

44.1 KB

The Story of Cryptowall.eng.txt

53.4 KB

The Story of Cryptowall.eng.vtt

46.8 KB

Travelling to the far side of Andromeda.eng.json

1.6 MB

Travelling to the far side of Andromeda.eng.lrc

37.5 KB

Travelling to the far side of Andromeda.eng.srt

42.4 KB

Travelling to the far side of Andromeda.eng.text

27.6 KB

Travelling to the far side of Andromeda.eng.tsv

33.4 KB

Travelling to the far side of Andromeda.eng.txt

37.8 KB

Travelling to the far side of Andromeda.eng.vtt

38.2 KB

/.../Botconf 2016 presentations/

2016-LT01-Unprotect_Roccia.pdf

984.6 KB

2016-LT02-Osiris-Poulson.pdf

1.4 MB

2016-LT03-7547-Mertens.pdf

1.6 MB

2016-LT05-Sisyphe-AUFFRET.pdf

43.2 KB

2016-LT06-KK-e-Silva.pdf

728.0 KB

2016-LT07-Android-Botnet-Analysis-Alothman.pdf

3.7 MB

2016-LT08-Botconf2016LightningTalkMartijnGrooten.pdf

160.5 KB

2016-LT09-TrickBot-Adams.pdf

1.2 MB

2016-LT11-dotNET-sample-analysis-Rifflet.pdf

840.1 KB

INV02-Ransomware-BEEK.pdf

22.4 MB

PR01-Visiting-Bears-Den-CAMPOS.pdf

3.4 MB

PR02-LURK-KROPOTOV.pdf

6.8 MB

PR03-Browser-based-Malware-Evolution-and-Prevention-KOVALEV-SIDOROV.pdf

1.8 MB

PR04-ESOM-DNS-MANDRYSCH.pdf

516.6 KB

PR05-Vawtrak-ACIN-BHAT.pdf

3.8 MB

PR06-SnoringOptional-WC-Botconf2016.pdf

6.9 MB

PR08-MOOSE-BILODEAU-PAQUET-CLOUSTON.pdf

4.8 MB

PR09-Tracking-exploit-kits-Bambenek.pdf

1.7 MB

PR10-Improve-DDoS-Botnet-Tracking-With-Honeypots-LIU.pdf

697.3 KB

PR11-Function-Identification-and-Recovery-Signature-Tool-Villegas.pdf

869.0 KB

PR12-Sysmon-UELTSCHI.pdf

4.6 MB

PR14-Tete-aTete_with_RSA_Bots_presentation-FRIESS.pdf

393.5 KB

PR15-Takedown-ISP-QUANG-TRAN-MINH.pdf

449.6 KB

PR16-Detecting-the-Behavioral-Relationships-of-Malware-Connections-GARCIA.pdf

5.9 MB

PR17-Analysis-of-Free-Movies-and-Series-Websites-Guided-by-Users-Search-Terms-BENTHIN.pdf

1.1 MB

PR18-Nymaim-ORTEGA.pdf

1.1 MB

PR20-ISFB-Kotowicz-.pdf

1.1 MB

PR21-Preventing-File-Based-Botnet-Growth-and-Persistence-ARMOUR.pdf

6.4 MB

WS04-Getting-Your-Hands-Dirty-How-to-Analyze-the-Behavior-of-Malware-Traffic-and-Web-Connections-VALEROS-GARCIA.pdf

186.0 KB

/.../Botconf 2016 video/

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.mp4

30.6 MB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.mp4

18.7 MB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.mp4

32.5 MB

Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.mp4

23.3 MB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.mp4

17.6 MB

Function Identification and Recovery Signature Tool - Angel Villegas.mp4

34.0 MB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.mp4

21.0 MB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.mp4

20.5 MB

ISFB, Still Live and Kicking - Maciej Kotowicz.mp4

26.8 MB

LURK The Story about Five Years of Activity - Vladimir Kropotov.mp4

25.4 MB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.mp4

298.1 MB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.mp4

23.5 MB

Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.mp4

36.9 MB

Takedown client server botnets the ISP way - Quảng Trần.mp4

21.7 MB

Tracking Exploit Kits - John Bambenek.mp4

31.5 MB

Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.mp4

33.9 MB

/.../Botconf 2016 captions/

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.json

1.2 MB

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.lrc

31.7 KB

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.srt

33.4 KB

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.text

24.5 KB

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.tsv

28.7 KB

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.txt

31.9 KB

Advanced Incident Detection and Threat Hunting using Sysmon and Splunk - Tom Ueltschi.eng.vtt

30.9 KB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.json

894.6 KB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.lrc

22.6 KB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.srt

24.7 KB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.text

17.3 KB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.tsv

20.3 KB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.txt

22.8 KB

Analysis of Free Movies and Series Websites Guided by Users Search Terms - Luis A. Benthin Sanguino.eng.vtt

22.6 KB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.json

2.4 MB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.lrc

68.5 KB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.srt

55.6 KB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.text

39.5 KB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.tsv

56.6 KB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.txt

69.7 KB

Attacking Linux Moose 2 0 Unraveled an EGO MARKET - Masarah Paquet-Clouston, Olivier Bilodeau.eng.vtt

50.8 KB

Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.json

1.1 MB

Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.lrc

28.9 KB

Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.srt

27.9 KB

Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.text

20.6 KB

Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.tsv

25.3 KB

Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.txt

29.2 KB

Browser based Malware - Evolution and Prevention - Andrey Kovalev, Evgeny Sidorov.eng.vtt

25.9 KB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.json

1.1 MB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.lrc

27.5 KB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.srt

29.0 KB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.text

19.3 KB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.tsv

23.9 KB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.txt

27.9 KB

Detecting the Behavioral Relationships of Malware Connections - Sebastián Garcia.eng.vtt

26.2 KB

Function Identification and Recovery Signature Tool - Angel Villegas.eng.json

1.8 MB

Function Identification and Recovery Signature Tool - Angel Villegas.eng.lrc

46.8 KB

Function Identification and Recovery Signature Tool - Angel Villegas.eng.srt

45.1 KB

Function Identification and Recovery Signature Tool - Angel Villegas.eng.text

32.5 KB

Function Identification and Recovery Signature Tool - Angel Villegas.eng.tsv

40.8 KB

Function Identification and Recovery Signature Tool - Angel Villegas.eng.txt

47.3 KB

Function Identification and Recovery Signature Tool - Angel Villegas.eng.vtt

41.4 KB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.json

683.3 KB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.lrc

18.0 KB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.srt

19.2 KB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.text

11.7 KB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.tsv

15.3 KB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.txt

18.3 KB

How Does Dridex Hide Friends - Sébastien Larinier, Alexandra Toussaint.eng.vtt

17.1 KB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.json

913.7 KB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.lrc

25.5 KB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.srt

25.3 KB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.text

17.1 KB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.tsv

21.8 KB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.txt

25.8 KB

Improve DDoS Botnet Tracking With Honeypots - Ya Liu.eng.vtt

23.0 KB

ISFB, Still Live and Kicking - Maciej Kotowicz.eng.json

1.7 MB

ISFB, Still Live and Kicking - Maciej Kotowicz.eng.lrc

46.8 KB

ISFB, Still Live and Kicking - Maciej Kotowicz.eng.srt

49.2 KB

ISFB, Still Live and Kicking - Maciej Kotowicz.eng.text

27.0 KB

ISFB, Still Live and Kicking - Maciej Kotowicz.eng.tsv

38.6 KB

ISFB, Still Live and Kicking - Maciej Kotowicz.eng.txt

47.5 KB

ISFB, Still Live and Kicking - Maciej Kotowicz.eng.vtt

42.9 KB

LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.json

986.3 KB

LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.lrc

23.9 KB

LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.srt

26.6 KB

LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.text

18.4 KB

LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.tsv

21.5 KB

LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.txt

24.1 KB

LURK The Story about Five Years of Activity - Vladimir Kropotov.eng.vtt

24.3 KB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.json

10.5 MB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.lrc

327.4 KB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.srt

246.9 KB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.text

167.3 KB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.tsv

253.7 KB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.txt

332.8 KB

MISP, the Threat Sharing Platform, a Developer Perspective to Extensions and Collaboration.eng.vtt

230.9 KB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.json

1.5 MB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.lrc

43.0 KB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.srt

36.2 KB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.text

26.3 KB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.tsv

35.8 KB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.txt

43.6 KB

Preventing File Based Botnet Persistence and Growth - Kurtis Armour.eng.vtt

33.3 KB

Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.json

2.2 MB

Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.lrc

53.1 KB

Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.srt

63.6 KB

Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.text

41.2 KB

Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.tsv

48.2 KB

Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.txt

53.5 KB

Snoring Is Optional - The Economics of Cyber Insurance and Malware - Wayne Crowder.eng.vtt

57.2 KB

Takedown client server botnets the ISP way - Quảng Trần.eng.json

960.2 KB

Takedown client server botnets the ISP way - Quảng Trần.eng.lrc

25.8 KB

Takedown client server botnets the ISP way - Quảng Trần.eng.srt

24.0 KB

Takedown client server botnets the ISP way - Quảng Trần.eng.text

18.0 KB

Takedown client server botnets the ISP way - Quảng Trần.eng.tsv

22.4 KB

Takedown client server botnets the ISP way - Quảng Trần.eng.txt

26.1 KB

Takedown client server botnets the ISP way - Quảng Trần.eng.vtt

22.3 KB

Tracking Exploit Kits - John Bambenek.eng.json

1.9 MB

Tracking Exploit Kits - John Bambenek.eng.lrc

50.9 KB

Tracking Exploit Kits - John Bambenek.eng.srt

48.5 KB

Tracking Exploit Kits - John Bambenek.eng.text

35.0 KB

Tracking Exploit Kits - John Bambenek.eng.tsv

44.3 KB

Tracking Exploit Kits - John Bambenek.eng.txt

51.5 KB

Tracking Exploit Kits - John Bambenek.eng.vtt

44.6 KB

Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.json

1.7 MB

Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.lrc

43.9 KB

Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.srt

44.7 KB

Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.text

32.8 KB

Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.tsv

39.4 KB

Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.txt

44.3 KB

Vawtrak Banking Trojan - A Threat to the Banking Ecosystem - Raashid Bhat, Victor Acin.eng.vtt

41.3 KB

/.../Botconf 2017 presentations/

2017_tomonaga-muda-Hunting-Attacker-Activities.pdf

2.1 MB

2017-AnthonyKasza-Formatting-for-justice.pdf

896.4 KB

2017-DanielPlohmann-Malpedia.pdf

1.5 MB

2017-Drimel-The_new_era_of_Android_Banking_Botnets.pdf

4.5 MB

2017-Eschweiler-YANT-Yet-Another-Nymaim-Talk-4.pdf

2.8 MB

2017-FelixAime_Kinghtcrawler.pdf

2.7 MB

2017-JedynakSrokosz-Use-your-enemies_-tracking-botnets-with-bots.pdf

9.1 MB

2017-KarineESilva-A-silver-path-1.pdf

731.3 KB

2017-KroustekMatulaZemek-retdec-slides-botconf-2017.pdf

12.6 MB

2017-MariaErquiaga-Malware-Uncertainty-Principle-Botconf-presentation3.pdf

1.3 MB

2017-Marinho-Exploring-a-Transient-P2P-Botnet.pdf

111.6 MB

2017-Meriot-IOT-1.pdf

5.6 MB

2017-OrEshed-MarkLechtik-get_rich_or_die_trying.pdf

8.4 MB

2017-RascagneresMaynor-Botconf_Nyetya-Final.pdf

11.4 MB

2017-Shirokova-An-overview-of-the-CMS-brute-forcing-landscape-.pdf

9.7 MB

2017-Simmons-Advanced-Threat-Hunting-4.pdf

5.1 MB

2017-VachonFaou-Stantinko.pdf

5.1 MB

DEFT_BOTCONF_2017.pdf

1.5 MB

/.../Botconf 2017 video/

Advanced Threat Hunting - Robert Simmons.mp4

27.3 MB

An Overview of the CMS Brute-Forcing Malware Landscape - Anna Shirokova.mp4

16.7 MB

Augmented Intelligence to Scale Humans Fighting Botnets - Amir Asiaee.mp4

21.2 MB

Automation Of Internet-Of-Things Botnets Takedown By An ISP - Sébastien Mériot.mp4

17.7 MB

How to detect watering holes - Félix Aimé.mp4

18.0 MB

Hunting Attacker Activities - Keisuke Muda - Shusei Tomonaga.mp4

21.5 MB

Malpedia A Collaborative Effort to Inventorize the Malware Landscape - Daniel Plohmann.mp4

36.0 MB

Malware Uncertainty Principle - Maria Jose Erquiaga.mp4

10.2 MB

Malware, Penny Stocks, Pharma Spam - Necurs Delivers - Jaeson Schultz.mp4

19.1 MB

PWS, Common, Ugly but Effective - Paul Jung.mp4

18.4 MB

RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.mp4

19.2 MB

The (makes me) Wannacry Investigation - Alan Neville.mp4

19.0 MB

/.../Botconf 2017 captions/

Advanced Threat Hunting - Robert Simmons.eng.srt

81.8 KB

An Overview of the CMS Brute-Forcing Malware Landscape - Anna Shirokova.eng.srt

43.1 KB

Augmented Intelligence to Scale Humans Fighting Botnets - Amir Asiaee.eng.srt

33.9 KB

Automation Of Internet-Of-Things Botnets Takedown By An ISP - Sébastien Mériot.eng.srt

31.7 KB

How to detect watering holes - Félix Aimé.eng.srt

34.7 KB

Hunting Attacker Activities - Keisuke Muda - Shusei Tomonaga.eng.srt

37.3 KB

Malpedia A Collaborative Effort to Inventorize the Malware Landscape - Daniel Plohmann.eng.srt

114.0 KB

Malware Uncertainty Principle - Maria Jose Erquiaga.eng.srt

19.5 KB

Malware, Penny Stocks, Pharma Spam - Necurs Delivers - Jaeson Schultz.eng.srt

51.3 KB

PWS, Common, Ugly but Effective - Paul Jung.eng.srt

21.8 KB

RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.json

1.5 MB

RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.lrc

36.5 KB

RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.srt

43.8 KB

RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.text

28.2 KB

RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.tsv

33.0 KB

RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.txt

36.8 KB

RetDec An Open-Source Machine-Code Decompiler - Jakub Křoustek, Peter Matula.eng.vtt

39.4 KB

The (makes me) Wannacry Investigation - Alan Neville.eng.srt

52.6 KB

/.../Botconf 2018 presentations/

2018-A-Rebstock-how_much_should_you_pay_for_your_own_botnet.pdf

2.0 MB

2018-Aseel-Kayal-APTC23.pdf

4.3 MB

2018-C-Ibrahim-RedTeamer-2.0-1.pdf

1.7 MB

2018-D-Desai-N-Singh-T-Dewan-Stagecraft.pdf

1.2 MB

2018-Dennis-Schwarz-everything_panda_banker.pdf

4.3 MB

2018-D-Plohmann-CodeCartographersDiary.pdf

2.2 MB

2018-E-Le-Jamtel-Cryptonote-hunting-1.3.pdf

2.8 MB

2018-F-Bacurio-Junior-J-Salvio-Trickbot-The-Trick-is-On-You-presented.pdf

1.7 MB

2018-I-Kwiatowski-R-Mouchoux-Automation-and-Structured-Knowledge-in-Tactical-Threat-Intelligence.pdf

2.2 MB

2018-JM-Esparza-Internals-Spam-Distribution-Botnet_Jose-Miguel-Esparza_Botconf18_TLP_WHITE.pdf

3.0 MB

2018-J-Sirmer-A-Streda-Botception.pdf

822.7 KB

2018-J-Soucek-J-Tomanek-CollectingMaliciousParticlesFromNeutrinoBotnets.pdf

6.9 MB

2018-J-Wyke-Tracking-actors-through-their-webinjects-.pdf

3.2 MB

2018-M-Faou-J-I-Boutin-turla.pdf

3.8 MB

2018-P-Bialczak-Leaving-no-stone-unturned-in-search-of-HTTP-malware.pdf

398.5 KB

2018-R-Dumont-H-Porcher-dark_side_of_the_forsshe.pdf

2.2 MB

2018-R-Joven-Mirai-Beyond-the-Aftermath.pdf

3.9 MB

2018-R-Jullian-In-depth-Formbook-Malware-Analysis-1.pdf

2.4 MB

2018-Tom-Ueltschi-Sysmon.pdf

8.7 MB

2018-T-Wu-G-Zhao-WASM-security-analyze-And-reverse-engineering.pdf

1.1 MB

2018-Y-Ishikawa-S-Nagano-Lets-go-with-a-Go-RAT-_final.pdf

4.2 MB

2018-Y-Liu-H-Wang-HowManyMiraiVariantsAreThere_public-1.pdf

3.9 MB

/.../Botconf 2019 presentations/

B2019-Baier-DeStroid.pdf

2.5 MB

B2019-Bialczak-Tracking-botnets-with-Long-Term-Sandboxing.pdf

2.8 MB

B2019-Bilstein-Plohmann-YaraSignator.pdf

867.2 KB

B2019-Camastra-Guildma_-timers-send-from-hell.pdf

2.5 MB

B2019-Eremin_Bot_with_rootkit.pdf

1.3 MB

B2019-Grooten-Malspam-is-Different-Spam.pdf

975.2 KB

B2019-Harpaz-Goldberg-Tracking-at-scale.pdf

3.9 MB

B2019-Holzer-tracking_samples_on_a_budget.pdf

1.8 MB

B2019-Ishimaru-Niseki-Ogawa-Mantis.pdf

2.9 MB

B2019-Neumann-Eberhardt-the_cereals_botnet_botconf_2019_final-2.pdf

2.7 MB

B2019-OReilly-Jarvis-End-to-end-Botnet-Monitoring.pdf

1.3 MB

B2019-Shipulin-Goncharov-Finding-Neutrino-Botnet.-From-Web-Scans-to-Botnet-Architecture-1.pdf

15.1 MB

B2019-Soucek-Hornak-DemystifyingBankingTrojansFromLatinAmerica.pdf

8.4 MB

/.../Botconf 2020 presentations/

2020-LukaszSiewierski-The-fall-of-Domino.pdf

902.1 KB

2020-Maciej-Kotowicz-Your-aa-is-on-Fire.pdf

2.1 MB

2020-MaxKersten-Hunting-for-MageCart.pdf

423.4 KB

2020-NadlerGarzon-Inline-Detection-of-Copy-Paste-Botnet-CC.pdf

4.5 MB

2020-NadlerGarzon-Tracking-Unsafe-Services-that-are-Hosted-by-Bots-using-IP-Reputation.pdf

2.8 MB

/.../Botconf 2020 video/

A detailed look into the Mozi P2P IoT botnet.mp4

10.5 MB

A Proposed Civil Liability Framework for Disrupting Botnets, a particular focus on Smart Devices.mp4

26.9 MB

An overview of the Botnet Simulation Framework.mp4

12.3 MB

APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications.mp4

15.9 MB

Fluxxy Dissection.mp4

11.6 MB

Fritzfrog A Story of a Unique P2P Botnet.mp4

16.8 MB

Hunting MageCart Skimmers.mp4

9.9 MB

Hunting the Quasar Family - How to Hunt Malware Family.mp4

19.6 MB

Inline Detection of Copy-Paste Botnet C&C.mp4

19.5 MB

The fall of Domino - a preinstalled hostile downloader.mp4

15.7 MB

Tracking Unsafe Services that are Hosted by Bots using IP Reputation.mp4

12.5 MB

Turla operations from a front row seat.mp4

13.7 MB

xOSSig - Leveraging OS Diversity to Automatically Extract Malware Code Signatures.mp4

16.6 MB

Your - aaS is on fire, or how threat actors (ab)use cloud providers.mp4

17.9 MB

/.../Botconf 2020 captions/

A detailed look into the Mozi P2P IoT botnet.eng.srt

31.2 KB

A Proposed Civil Liability Framework for Disrupting Botnets, a particular focus on Smart Devices.eng.srt

52.6 KB

An overview of the Botnet Simulation Framework.eng.srt

40.2 KB

APKatche Me If You Can Uncovering Obfuscation-as-a-Service for Malicious Android Applications.eng.srt

48.3 KB

Fluxxy Dissection.eng.srt

45.4 KB

Fritzfrog A Story of a Unique P2P Botnet.eng.srt

47.5 KB

Hunting MageCart Skimmers.eng.srt

35.0 KB

Hunting the Quasar Family - How to Hunt Malware Family.eng.srt

34.7 KB

Inline Detection of Copy-Paste Botnet C&C.eng.srt

41.7 KB

The fall of Domino - a preinstalled hostile downloader.eng.srt

42.8 KB

Tracking Unsafe Services that are Hosted by Bots using IP Reputation.eng.srt

27.0 KB

Turla operations from a front row seat.eng.srt

41.0 KB

xOSSig - Leveraging OS Diversity to Automatically Extract Malware Code Signatures.eng.srt

50.7 KB

Your - aaS is on fire, or how threat actors (ab)use cloud providers.eng.srt

49.3 KB

/.../Botconf 2022 presentations/

Botconf2022-01-YerushalmiSimonovich-2.pdf

4.5 MB

Botconf2022-03-vanderLindenKersten-2.pdf

696.0 KB

Botconf2022-04-MyrakasymovRogachev.pdf

8.1 MB

Botconf2022-06-DaihesTzaban.pdf

2.0 MB

Botconf2022-10-Regeciova.pdf

1.3 MB

Botconf2022-12-Kersten-SeeYaSharp-1.pdf

670.6 KB

Botconf2022-16-PoliakovaYuzifovich.pdf

17.6 MB

Botconf2022-17-PimentaLopez.pdf

1.4 MB

Botconf2022-18-PicadoRubio.pdf

2.3 MB

Botconf2022-19-FaouCoteCyr.pdf

5.0 MB

Botconf2022-23-DoraisMunoz.pdf

2.6 MB

Botconf2022-24-PalotayZsigovits.pdf

12.7 MB

Botconf2022-26-BrunoniDecaryHetu.pdf

2.1 MB

Botconf2022-31-Alvares.pdf

2.4 MB

Botconf2022-37-Hammou.pdf

1.1 MB

Botconf2022-39-BoeckKaruppayah.pdf

3.1 MB

Botconf2022-40-LunghiHorejsi.pdf

1.1 MB

Botconf2022-42-BarthelEydam-1.pdf

962.7 KB

Botconf2022-43-Tartare-1.pdf

3.9 MB

LT01-Botconf-2022-Finding-compromised-upl.php-devices.pdf

493.9 KB

LT02-BotConf2022_LT_Tom-Ueltschi.pdf

509.8 KB

LT03-20220428_BotConf_Twitter.pdf

343.7 KB

LT06-Botconf2022_LightningTalk_BinaryAnalysisCourse-1.pdf

225.5 KB

LT09-Botconf-2022-Hugo_RIFFLET-V2.pdf

290.8 KB

/.../Botconf 2022 video/

A Fresh Look Into The Underground Card Shop Ecosystem.mp4

33.8 MB

Detecting And Disrupting Compromised Devices Based On Their Communication Patterns To Legitimate Web.mp4

18.1 MB

Detecting Emerging Malware On Cloud Before Virustotal Can See It.mp4

41.6 MB

Evolution Of The Sysrv Mining Botnet.mp4

44.8 MB

Fingerprinting Bot Shops Venues, Stealers, Sellers.mp4

50.1 MB

How Formbook Became Xloader And Migrated To Macos.mp4

36.6 MB

How To Eavesdrop On Winnti In A Live Environment Using Virtual Machine Introspection (Vmi).mp4

40.6 MB

Insights And Experiences From Monitoring Multiple P2p Botnets.mp4

25.5 MB

Into The Silent Night.mp4

13.8 MB

Jumping The Air-Gap 15 Years Of Nation-State Efforts.mp4

33.3 MB

Lightning talks.mp4

37.1 MB

Operation Gamblingpuppet Analysis Of A Multiplatform Campaign Targeting Online Gambling Customers.mp4

34.5 MB

Pareto Streaming Mimicry (Sponsor Technical Talk).mp4

20.0 MB

Private Clubs For Hackers How Private Forums Shape The Malware Market.mp4

36.7 MB

Privateloader - The Malware Behind A Havoc-Wreaking Pay-Per-Install Service.mp4

27.6 MB

Proxychaos A Year-In-Review Of Microsoft Exchange Exploitation.mp4

36.9 MB

Qakbot Malware Family Evolution.mp4

23.9 MB

RTM Sink-Holing The Botnet.mp4

28.2 MB

Smoke And Fire - Smokeloader Historical Changes And Trends.mp4

33.0 MB

Suricata (In Preview For A Workshop In 2023).mp4

23.4 MB

Warning Botnet Is In Your House.mp4

35.0 MB

Yara Down The Rabbit Hole Without Slowing Down.mp4

27.8 MB

/.../Botconf 2022 captions/

A Fresh Look Into The Underground Card Shop Ecosystem.eng.srt

58.8 KB

Detecting And Disrupting Compromised Devices Based On Their Communication Patterns To Legitimate Web.eng.srt

33.9 KB

Detecting Emerging Malware On Cloud Before Virustotal Can See It.eng.srt

72.0 KB

Evolution Of The Sysrv Mining Botnet.eng.srt

79.8 KB

Fingerprinting Bot Shops Venues, Stealers, Sellers.eng.srt

108.1 KB

How Formbook Became Xloader And Migrated To Macos.eng.srt

71.6 KB

How To Eavesdrop On Winnti In A Live Environment Using Virtual Machine Introspection (Vmi).eng.srt

62.5 KB

Insights And Experiences From Monitoring Multiple P2p Botnets.eng.srt

44.3 KB

Into The Silent Night.eng.srt

25.9 KB

Jumping The Air-Gap 15 Years Of Nation-State Efforts.eng.srt

56.4 KB

Lightning talks.eng.srt

60.3 KB

Operation Gamblingpuppet Analysis Of A Multiplatform Campaign Targeting Online Gambling Customers.eng.srt

62.1 KB

Pareto Streaming Mimicry (Sponsor Technical Talk).eng.srt

33.5 KB

Private Clubs For Hackers How Private Forums Shape The Malware Market.eng.srt

60.7 KB

Privateloader - The Malware Behind A Havoc-Wreaking Pay-Per-Install Service.eng.srt

56.7 KB

Proxychaos A Year-In-Review Of Microsoft Exchange Exploitation.eng.srt

68.7 KB

Qakbot Malware Family Evolution.eng.srt

43.5 KB

RTM Sink-Holing The Botnet.eng.srt

47.6 KB

Smoke And Fire - Smokeloader Historical Changes And Trends.eng.srt

68.2 KB

Suricata (In Preview For A Workshop In 2023).eng.json

1.1 MB

Suricata (In Preview For A Workshop In 2023).eng.lrc

33.7 KB

Suricata (In Preview For A Workshop In 2023).eng.srt

25.6 KB

Suricata (In Preview For A Workshop In 2023).eng.text

18.1 KB

Suricata (In Preview For A Workshop In 2023).eng.tsv

26.8 KB

Suricata (In Preview For A Workshop In 2023).eng.txt

34.3 KB

Suricata (In Preview For A Workshop In 2023).eng.vtt

23.4 KB

Warning Botnet Is In Your House.eng.srt

63.2 KB

Yara Down The Rabbit Hole Without Slowing Down.eng.srt

50.4 KB

/.../Botconf 2023 presentations/

2023_1166_OZERY.pdf

1.4 MB

2023_1958_DAI.pdf

3.4 MB

2023_4669_SIEWIERSKI_GURTIN.pdf

3.2 MB

2023_4737_PEREZ.pdf

2.8 MB

2023_4889_DESOUZA.pdf

2.5 MB

2023_5856_LUNGHI.pdf

1.5 MB

2023_7155_KUMAR.pdf

4.2 MB

2023_8279_REGECIOVA.pdf

1.3 MB

2023_8336_SEONGSU.pdf

827.2 KB

2023_8369_MOUCHOUX.pdf

1.3 MB

2023_8532_SILLAM-1.pdf

4.4 MB

2023_9442_WAGNER-1.pdf

5.4 MB

2023_ASHOK.pdf

2.5 MB

2023_Chevalier_Couchard_When-a-botnet-cries_-detecting-botnet-infection-chains.pdf

4.0 MB

2023_FAOU_AsylumAmbuscade.pdf

5.6 MB

2023_GROOTEN-1.pdf

4.4 MB

2023_Kersten_EnterpriseMalware.pdf

1.2 MB

2023_Kersten_RTMLocker-1.pdf

2.2 MB

2023-03-CASHDOLLAR.pdf

2.1 MB

2023-10-LingmingTu.pdf

5.2 MB

2023-15-Plohmann_MCRIT.pdf

4.9 MB

2023LT01OK-Felix-Guyard.pdf

900.8 KB

2023LT02OK-Tom-Ueltschi.pdf

581.7 KB

2023LT03OK-Patrice-Auffret.pdf

536.4 KB

2023LT04OK-Eric-Leblond-Suricata-Language-Server-1.pdf

1.2 MB

2023LT05OK-Jean-Marsault-Hiding-in-plain-sight-abusing-Graph-API-for-the-win.pdf

395.7 KB

2023LT06OK-AloisDeSouza.pdf

6.6 MB

2023LT07OK-Boris-Lickindorf-Houdini.pdf

1.1 MB

2023LT09OK-Etienne-Khan.pdf

3.8 MB

2023LT10OK-Jean-Baptiste-Rouault-UYBHYS.pdf

694.9 KB

2023LT13OK-Frederic-Baguelin-The-Snake-is-in-the-Grass-Finding-Malicious-PyPI-Packages-in-the-Wi.pdf

3.6 MB

2023LT14OK-Valery-Marchive.pdf

1.3 MB

2023LT16OK-Frederic-Grelot-4.pdf

982.8 KB

BOTCONF2023_Hammou-Rodriguez.pdf

2.3 MB

BOTCONF2023_presentation_6693_VALENTINI_STRINO.pdf

5.6 MB

/.../Botconf 2023 video/

A dissection of the KmsdBot - Larry W. Cashdollar - Allen West.mp4

25.0 MB

A student’s guide to free and open-source enterprise level malware analysis tooling - Max Kersten.mp4

14.1 MB

Asylum Ambuscade Crimeware or cyberespionage - Matthieu Faou.mp4

24.9 MB

Cyber Swachhta Bharat- India’s answer to botnet and malware ecosystems - Pratiksha Ashok.mp4

31.0 MB

Digital threats against civil society in the rest of the world - Martijn Grooten.mp4

32.3 MB

From GhostNet to PseudoManuscrypt - The evolution of Gh0st RAT - Jorge Rodriguez - Souhail Hammou.mp4

30.7 MB

From Words to Intelligence Leveraging the Cyber Operation Constraint Principle, Natural Language.mp4

33.5 MB

Iron Tiger Enhances its TTPs and Targets Linux and MacOS Users - Daniel Lunghi.mp4

27.3 MB

Lightning Talks 2023.mp4

38.5 MB

MCRIT The MinHash-based Code Relationship & Investigation Toolkit.mp4

48.1 MB

Operation drIBAN insight from modern banking frauds behind Ramnit - Federico Valentini.mp4

48.4 MB

Perfect Smoke and Mirrors of Enemy Following Lazarus group by tracking DeathNote - Seongsu Park.mp4

29.3 MB

RAT as a Ransomware - An Hybrid Approach - Nirmal Singh - Avinash Kumar - Niraj Shivtarkar (Co-author).mp4

31.0 MB

Read The Manual Locker A Private RaaS Provider - Max 'Libra' Kersten.mp4

28.7 MB

Security Implications of QUIC - Paul Vixie.mp4

45.1 MB

Syslogk Linux Kernel Rootkit - Executing Bots via Magic Packets - David Álvarez Pérez.mp4

34.8 MB

The Case For Real Time Detection of Data Exchange Over the DNS Protocol - Yarin Ozery.mp4

18.7 MB

The Fodcha Botnets We Watched - Lingming Tu - Liu Ya.mp4

34.0 MB

The Plague of Advanced Bad Bots - Deconstructing the Malicious Bot Problem - Yohann Sillam.mp4

25.0 MB

Tracking Bumblebee’s Development - Suweera De Souza.mp4

28.5 MB

When a botnet cries detecting botnets infection chains - Erwan Chevalier - Guillaume Couchard.mp4

38.9 MB

Yara Studies A Deep Dive into Scanning Performance - Dominika Regéciová.mp4

34.7 MB

You OTA Know Combating Malicious Android System Updaters - Łukasz Siewierski - Alec Guertin.mp4

44.0 MB

/.../Botconf 2023 captions/

A dissection of the KmsdBot - Larry W. Cashdollar - Allen West.eng.srt

45.0 KB

A student’s guide to free and open-source enterprise level malware analysis tooling - Max Kersten.eng.srt

28.5 KB

Asylum Ambuscade Crimeware or cyberespionage - Matthieu Faou.eng.srt

43.5 KB

Cyber Swachhta Bharat- India’s answer to botnet and malware ecosystems - Pratiksha Ashok.eng.srt

42.6 KB

Digital threats against civil society in the rest of the world - Martijn Grooten.eng.srt

62.5 KB

From GhostNet to PseudoManuscrypt - The evolution of Gh0st RAT - Jorge Rodriguez - Souhail Hammou.eng.srt

56.8 KB

From Words to Intelligence Leveraging the Cyber Operation Constraint Principle, Natural Language.eng.srt

14.0 KB

Iron Tiger Enhances its TTPs and Targets Linux and MacOS Users - Daniel Lunghi.eng.srt

55.1 KB

Lightning Talks 2023.eng.srt

58.7 KB

MCRIT The MinHash-based Code Relationship & Investigation Toolkit.eng.srt

90.6 KB

Operation drIBAN insight from modern banking frauds behind Ramnit - Federico Valentini.eng.srt

67.5 KB

Perfect Smoke and Mirrors of Enemy Following Lazarus group by tracking DeathNote - Seongsu Park.eng.srt

54.6 KB

RAT as a Ransomware - An Hybrid Approach - Nirmal Singh - Avinash Kumar - Niraj Shivtarkar (Co-author).eng.srt

42.2 KB

Read The Manual Locker A Private RaaS Provider - Max 'Libra' Kersten.eng.srt

41.9 KB

Security Implications of QUIC - Paul Vixie.eng.srt

73.9 KB

Syslogk Linux Kernel Rootkit - Executing Bots via Magic Packets - David Álvarez Pérez.eng.srt

52.5 KB

The Case For Real Time Detection of Data Exchange Over the DNS Protocol - Yarin Ozery.eng.srt

31.8 KB

The Fodcha Botnets We Watched - Lingming Tu - Liu Ya.eng.srt

44.4 KB

The Plague of Advanced Bad Bots - Deconstructing the Malicious Bot Problem - Yohann Sillam.eng.srt

42.7 KB

Tracking Bumblebee’s Development - Suweera De Souza.eng.srt

55.5 KB

When a botnet cries detecting botnets infection chains - Erwan Chevalier - Guillaume Couchard.eng.srt

58.1 KB

Yara Studies A Deep Dive into Scanning Performance - Dominika Regéciová.eng.srt

59.7 KB

You OTA Know Combating Malicious Android System Updaters - Łukasz Siewierski - Alec Guertin.eng.srt

70.9 KB

/.../Botconf 2024 presentations/

BOTCONF2024-AimeMeslay-Unplugging-PlugX.pdf

2.3 MB

BOTCONF2024-EndersPohlmann-A-Taxonomic-Overview-of-Prevalent-Malware-Communication-Strategies.pdf

3.8 MB

BOTCONF2024-Fabian-Marquardt-TA577_Talk.pdf

1.8 MB

BOTCONF2024-Frank-Everyone-Gets-a-Web-Shell-Or-Backdooring-Web-Hosting-Companies-in-Scale.pdf

3.3 MB

BOTCONF2024-IshikawaMatsumoto-New_Modular_Malware_RatelS_Shades_of_PlugX_final.pdf

7.3 MB

BOTCONF2024-Ladutska-Korean_Android_Financial_Menace_FakeCalls_BC2024_RC.pdf

4.3 MB

BOTCONF2024-NiwaIshimaruSato-IntotheVapor_ICI.pdf

8.1 MB

BOTCONF2024-Pham-Marion.pdf

12.9 MB

BOTCONF2024-Regeciova-GenRex.pdf

2.1 MB

BOTCONF2024-SanchezMartinez-v1.0.pdf

6.4 MB

BOTCONF2024-ShamshurLadutska-Eastern-Asian-Android-Assault-FluHorse.pdf

2.2 MB

BOTCONF2024WS1-Hammou.pdf

1.8 MB

BOTCONF2024WS3-Kersten-Dotnet.pdf

2.1 MB

LT01-BotConf2024_LT_Tom-Ueltschi.pdf

910.8 KB

/.../Botconf 2024 video/

A Taxonomic Overview of Prevalent Malware Communication Strategies.mp4

25.1 MB

Eastern Asian Android Assault - FluHorse - Alexandr Shamshur and Raman Ladutska.mp4

20.2 MB

Evasions Fest of Korean Android Financial Menace - FakeCalls - Raman Ladutska and Bohdan Melnykov.mp4

29.6 MB

GenRex Demonstration Level Up Your Regex Game - Dominika Regéciová.mp4

28.5 MB

I'm a Bad Noodle An Analysis of Noodle RAT Shared among China nexus Groups - Hiroaki Hara.mp4

36.1 MB

IoT Malware and Rookit Detections Using Electromagnetic Insights Unveiling the Unseen.mp4

36.5 MB

Lightlight Talks - Botconf 2024.mp4

56.2 MB

LightSpy2 feature rich mobile surveillance tool set - Victor Chebyshev.mp4

24.8 MB

Malware distribution at scale - The ecosystem of TA577 - Fabian Marquardt.mp4

26.8 MB

Monitoring 1st stage samples used by APTs and crime actors using images - Jose Luis Sanchez Martinez.mp4

34.8 MB

Telegram as a C2 or a Fourfold Tale of Bad OPSEC - Pol Thill.mp4

21.5 MB

The Supershell and its widespread Botnet - Chetan Raghuprasad.mp4

22.6 MB

Unplugging PlugX Sinkholing the PlugX USB worm botnet - Félix Aimé and Charles Meslay.mp4

34.4 MB

Unveiling the Shadows The Dark Alliance between GuLoader and Remcos - Alexey Bukhteyev Arie Olshtein.mp4

27.3 MB

/.../Botconf 2024 captions/

A Taxonomic Overview of Prevalent Malware Communication Strategies.eng.srt

49.9 KB

Eastern Asian Android Assault - FluHorse - Alexandr Shamshur and Raman Ladutska.eng.srt

37.3 KB

Evasions Fest of Korean Android Financial Menace - FakeCalls - Raman Ladutska and Bohdan Melnykov.eng.srt

55.3 KB

GenRex Demonstration Level Up Your Regex Game - Dominika Regéciová.eng.srt

42.6 KB

I'm a Bad Noodle An Analysis of Noodle RAT Shared among China nexus Groups - Hiroaki Hara.eng.srt

60.2 KB

IoT Malware and Rookit Detections Using Electromagnetic Insights Unveiling the Unseen.eng.srt

54.6 KB

Lightlight Talks - Botconf 2024.eng.srt

66.9 KB

LightSpy2 feature rich mobile surveillance tool set - Victor Chebyshev.eng.srt

40.9 KB

Malware distribution at scale - The ecosystem of TA577 - Fabian Marquardt.eng.srt

45.4 KB

Monitoring 1st stage samples used by APTs and crime actors using images - Jose Luis Sanchez Martinez.eng.srt

60.7 KB

Telegram as a C2 or a Fourfold Tale of Bad OPSEC - Pol Thill.eng.srt

46.4 KB

The Supershell and its widespread Botnet - Chetan Raghuprasad.eng.srt

38.9 KB

Unplugging PlugX Sinkholing the PlugX USB worm botnet - Félix Aimé and Charles Meslay.eng.srt

46.5 KB

Unveiling the Shadows The Dark Alliance between GuLoader and Remcos - Alexey Bukhteyev Arie Olshtein.eng.srt

46.0 KB

 

Total files 970


Copyright © 2025 FileMood.com