SecRat works at a start-up. He's interested in Windows Driver Programming.
-
How to Complete a Vulnerability Assessment with Nessus
By SecRat on March 21, 2018
-
How to Use AlientVault SIEM for Threat Detection & Incident Response
By SecRat on March 21, 2018
-
QuadRooter Attack Overview: Vulnerabilities, Methods & Mitigations
By SecRat on March 20, 2018
-
How to Configure & Use Suricata for Threat Detection
By SecRat on March 7, 2018
-
WannaCryptor Analysis
By SecRat on November 30, 2017
-
TrojanDownloader.Wask Analysis
By SecRat on January 26, 2017
-
API Call Logging: Windows API
By SecRat on January 20, 2017
-
Analysis of a Spam Bot
By SecRat on January 18, 2017
-
Reversing the Pony Trojan part II
By SecRat on December 9, 2015
-
Reversing the Pony Trojan Part I
By SecRat on November 23, 2015
-
Analyzing a DDoS Trojan
By SecRat on November 17, 2015
-
ELF File Format
By SecRat on May 29, 2015
-
Introducing IDA scripting
By SecRat on May 25, 2015
-
Writing Python Compiled Modules
By SecRat on May 21, 2015
-
Cracking 64bit Binaries
By SecRat on May 18, 2015
-
Windows Exploit Mitigation Technology – Part 2
By SecRat on February 24, 2015
-
Windows Exploit Mitigation Technology – Part 1
By SecRat on February 13, 2015
-
Extending Network Reconnaissance Tools
By SecRat on July 14, 2014
-
Windows Cryptography API
By SecRat on July 11, 2014
-
Advanced sqlmap
By SecRat on July 10, 2014