Notes
A curated index of my notes can be found here
Below are bibcard-style notes taken while reading, watching videos, and working through courses.
-
Alonso, Angel (2016) Anatomy of a Real Linux Intrusion Part I: Running a MiTM SSH honeypot
-
Alonso, Angel (2016) Anatomy of a Real Linux Intrusion Part II: OpenSSH trojanized toolkit
-
Amethyst Basilisk (2024) Broodsac: A VX Adventure in Build Systems and Oldschool Techniques
-
Antoniuk, Daryna (2024) China-linked hackers target Linux systems with new spying malware
-
Baines, Jacob (2016) Programming Linux Anti-Reversing Techniques
-
Baumgartner, Kurt (2015) TurlaSat: The Fault in our Stars - Turla’s Exquisite Satlink Appropriation
-
BJJ Scout (2024) BJJ Scout: Murilo Santana Passing Study Part 1 - Stacks and Over Unders
-
Black Lotus Labs (2022) Chaos Is A Go-Based Swiss Army Knife Of Malware
-
Boelen, Michael (2025) Auditing Linux processes: The Deep Dive!
-
Brown, Rebekah (2017) The Shadow Brokers Leaked Exploits Explained
-
Buchanan, David (2024) MPEG-CENC: Defective by Specification
-
Cesare, Silvio (1999) Linux Anti-Debugging Techniques (Fooling the Debugger)
-
Constantin, Lucian (2024) Mirai-based Noabot botnet deploys cryptominer on Linux servers
-
Dumont, Romain. M.Leveille, Marc-Etienne. Porcher, Hugo (2018) The Dark Side of the ForSSHe
-
Fiser, David. Oliveira, Alfredo (2021) Tracking the Activities of TeamTNT
-
g1inko (2024) Finding hidden kernel modules (extrem way reborn): 20 years later
-
Hand, Matt (2024) Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems
-
Heathfield, Richard (2000) C Unleashed: From Knowledge to Mastery
-
Kaspersky GReAT Team (2015) Equation: The Death Star of Malware Galaxy
-
Kaspersky GReAT Team (2020) An overview of targeted attacks and APTs on Linux
-
Kennedy, Joakim Dr. (2022) Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
-
Krebs, Brian (2016) Source Code for IoT Botnet ‘Mirai’ Released
-
Lang, Nicholas (2023) Chaos Malware Quietly Evolves Persistence and Evasion Techniques
-
Loeb, Angela (2012) I’m Getting What I Want… And It’s Incredibly Easy
-
Malone, Barry (2023) Sliver: Intro to An Awesome C2 Framework
-
ManageEngine (2024) Credential Theft Using Procdump or Comsvcs
-
Nazarov, Konstantin (2023) Statically linked Python interpreter
-
Pace, Shelby (2019) Metasploit Shellcode Grows Up: Encrypted and Authenticated C Shells
-
Pangu Lab (2022) Bvp47 Top-tier Backdoor of US NSA Equation Group
-
Petrich, Ryan (2024) Stealth Shell: A Fully Virtualized Attack Toolchain
-
Pierce, Sean (2015) Defending Against Malicious Application Compatibility Shims
-
Pourcelot, Tristan (2022) Tricephalic Hellkeeper: a tale of a passive backdoor
-
PwC Threat Intelligence (2022) The Tortoise and The Malwahare
-
Raiu, Costin. Moore, Daniel. Guerrero-Sade, Juan Andres. Rid, Thomas (2017) Penguin’s Moonlit Maze
-
Rather, Dan (2016) Dan Rather on Journalism & Finding the Truth in the News
-
Remillano, Augusto. Gelera, Byron (2019) Outlaw’s Botnet Spreads Miner, Perl-Based Backdoor
-
Ribak, Lior (2020) Leveraging LD_AUDIT to Beat the Traditional Linux Library Preloading Technique
-
Rowland, Craig (2019) Getting an Attacker IP Address from a Malicious Linux At Job
-
ropnop (2017) Upgrading Simple Shells to Fully Interactive TTYs
-
Sanmillan, Ignacio (2019) HiddenWasp Malware Stings Targeted Linux Systems
-
Schiffman, Mike D. (2003) Building Open Source Network Security Tools: Components and Techniques
-
Scramble Blog (2024) Fixing Common Postural Problems in BJJ and MMA
-
Sektor7 Institute (2020) RED TEAM Operator: Malware Development Essentials Course
-
Sharma, Siddarth (2023) When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief
-
Song, Wagner, Tian (2001) Timing Analysis of Keystrokes and Timing Attacks on SSH
-
Sperka, Viktor (2024) Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
-
Strand, John (2013) Offensive Countermeasures: The Art of Active Defense
-
Tanium CTI (2023) CTI Roundup: Skuld Malware Steals Discord Data From Windows PCs
-
Vermeulen, Sven (2020) SELinux System Administration - Third Edition