security bookmarks

2
http://securityxploded.com/malware-analysis-training-reference.php http://www.infosecinstitute.com/courses/advanced_reverse_engineering_malware.htm l http://blog.malwarebytes.org/intelligence/2012/09/so-you-want-to-be-a-malware-an alyst/ https://tuts4you.com/download.php?list.19 http://ipositivesecurity.blogspot.in/2011/06/passed-giac-grem_21.html http://offensivecomputing.net/ http://digital-forensics.sans.org/blog/2010/11/12/get-started-with-malware-analy sis/ http://www.concise-students.com/unit/view/id:1519 http://cybergrandchallenge.com/ http://www.codeproject.com/Articles/246545/Stuxnet-Malware-Analysis-Paper http://www.emich.edu/ia/pdf/Under%20Grad%20Courses%20PDF/IA%20400%20Malware%20An alysis%20Syllabus.pdf https://www.ethicalhacker.net/features/root/interview-lenny-zeltser-of-savvis-an d-sans-institute http://www.docstoc.com/docs/55844794/GIAC-Reverse-Engineering-Malware-(GREM)-Pra ctical-Assignment https://www.facebook.com/LearnREM http://zeltser.com/combating-malicious-software/malware-sample-sources.html?utm_ content=buffer2fb50&utm_medium=social&utm_source=facebook.com&utm_campaign=buffe r http://contagiodump.blogspot.in/2010/11/links-and-resources-for-malware-samples. html http://bugix-security.blogspot.in/ http://digital-forensics.sans.org/blog/2014/06/04/managing-and-exploring-malware -samples-with-viper?utm_content=buffer0c39b&utm_medium=social&utm_source=faceboo k.com&utm_campaign=buffer https://github.com/botherder/viper https://plus.google.com/+LennyZeltser/posts http://zeltser.com/reverse-malware/reverse-malware-course-comments.html http://zeltser.com/remnux/ http://zeltser.com/remnux/remnux-v5-tools.pdf http://zeltser.com/remnux/remnux5-installation-notes.html https://www.facebook.com/notes/reverse-engineering-malware-course/topics-covered -by-the-reverse-engineering-malware-course/170382054792 http://zeltser.com/reverse-malware/day5/ http://detroitdavesraves.blogspot.in/2012/09/passed-grem-exam.html http://www.giac.org/exams/proctor/program-details http://www.sans.org/reading-room#__utma=183869984.2146209136.1400017548.14016532 54.1401909458.11&__utmb=183869984.6.9.1401909512655&__utmc=183869984&__utmx=-&__ utmz=183869984.1401641908.8.3.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmc tr=(not%20provided)&__utmv=-&__utmk=39776291

Upload: ram-ganesh

Post on 13-Oct-2015

7 views

Category:

Documents


0 download

DESCRIPTION

Bookmarks of some important security resources

TRANSCRIPT

http://securityxploded.com/malware-analysis-training-reference.phphttp://www.infosecinstitute.com/courses/advanced_reverse_engineering_malware.htmlhttp://blog.malwarebytes.org/intelligence/2012/09/so-you-want-to-be-a-malware-analyst/https://tuts4you.com/download.php?list.19http://ipositivesecurity.blogspot.in/2011/06/passed-giac-grem_21.htmlhttp://offensivecomputing.net/http://digital-forensics.sans.org/blog/2010/11/12/get-started-with-malware-analysis/http://www.concise-students.com/unit/view/id:1519http://cybergrandchallenge.com/http://www.codeproject.com/Articles/246545/Stuxnet-Malware-Analysis-Paperhttp://www.emich.edu/ia/pdf/Under%20Grad%20Courses%20PDF/IA%20400%20Malware%20Analysis%20Syllabus.pdfhttps://www.ethicalhacker.net/features/root/interview-lenny-zeltser-of-savvis-and-sans-institutehttp://www.docstoc.com/docs/55844794/GIAC-Reverse-Engineering-Malware-(GREM)-Practical-Assignmenthttps://www.facebook.com/LearnREMhttp://zeltser.com/combating-malicious-software/malware-sample-sources.html?utm_content=buffer2fb50&utm_medium=social&utm_source=facebook.com&utm_campaign=bufferhttp://contagiodump.blogspot.in/2010/11/links-and-resources-for-malware-samples.htmlhttp://bugix-security.blogspot.in/http://digital-forensics.sans.org/blog/2014/06/04/managing-and-exploring-malware-samples-with-viper?utm_content=buffer0c39b&utm_medium=social&utm_source=facebook.com&utm_campaign=bufferhttps://github.com/botherder/viperhttps://plus.google.com/+LennyZeltser/postshttp://zeltser.com/reverse-malware/reverse-malware-course-comments.htmlhttp://zeltser.com/remnux/http://zeltser.com/remnux/remnux-v5-tools.pdfhttp://zeltser.com/remnux/remnux5-installation-notes.htmlhttps://www.facebook.com/notes/reverse-engineering-malware-course/topics-covered-by-the-reverse-engineering-malware-course/170382054792http://zeltser.com/reverse-malware/day5/http://detroitdavesraves.blogspot.in/2012/09/passed-grem-exam.htmlhttp://www.giac.org/exams/proctor/program-detailshttp://www.sans.org/reading-room#__utma=183869984.2146209136.1400017548.1401653254.1401909458.11&__utmb=183869984.6.9.1401909512655&__utmc=183869984&__utmx=-&__utmz=183869984.1401641908.8.3.utmcsr=google|utmccn=(organic)|utmcmd=organic|utmctr=(not%20provided)&__utmv=-&__utmk=39776291