Notes
Here are notes taken while reading, watching videos, and working through courses.
-
Amethyst Basilisk (2024) Broodsac: A VX Adventure in Build Systems and Oldschool Techniques
-
Baines, Jacob (2016) Programming Linux Anti-Reversing Techniques
-
Baumgartner, Kurt (2015) TurlaSat: The Fault in our Stars - Turla’s Exquisite Satlink Appropriation
-
Cesare, Silvio (1999) Linux Anti-Debugging Techniques (Fooling the Debugger)
-
g1inko (2024) Finding hidden kernel modules (extrem way reborn): 20 years later
-
Hand, Matt (2024) Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems
-
Heathfield, Richard (2000) C Unleashed: From Knowledge to Mastery
-
Petrich, Ryan (2024) Stealth Shell: A Fully Virtualized Attack Toolchain
-
Raiu, Costin. Moore, Daniel. Guerrero-Sade, Juan Andres. Rid, Thomas (2017) Penguin’s Moonlit Maze
-
ropnop (2017) Upgrading Simple Shells to Fully Interactive TTYs
-
Schiffman, Mike D. (2003) Building Open Source Network Security Tools: Components and Techniques
-
Sharma, Siddarth (2023) When PAM Goes Rogue: Malware Uses Authentication Modules for Mischief
-
Song, Wagner, Tian (2001) Timing Analysis of Keystrokes and Timing Attacks on SSH