- Malware Analyser
- Different Types of Rootkits
- Virus Bulletin comparitive reviews
- Bottyscan -- A simple python based PoC IRC bot
- Botnet Monitoring
- Search Engine Optimization (SEO) based attacks
- Malware 2.0 development..."vinnu"
- Malware 2.0 development..."vinnu"
- Demystifying The Ashi virus
- Pushdo / Cutwail Botnet
- “Here you have” malware (aka W32/VBMania@MM)-Outbreak
- NatSec worm Source code --- Lets discus..."vinnu"
- Malware Analysis for beginners
- Stuxnet-Under the microscope
- Facebook Phishing time!
- The Windows System State Analyzer!
- Zero Wine: Malware Behavior Analysis
- doz.me: The evil url shortener
- Stuxnet ms10-073/cve-2010-2743 exploit
- Let us develop Artificial Life
- JavaScript Botnets
- NEED help for CYBERGAT or likewise RAT
- Malicious PDF file Analysis
- Analysing Malware: A beginners approach :)
- Malicious PDF analysis
- TDL-4, The Latest Variant of TDSS Rootkit
- List of Free Sandboxes for Malware Analysis!
- Decoding Malware SSL communications using Burp proxy
- SFX package : A good virus handler
- Tools, Techniques, Procedures of the RSA Hackers Revealed
- Online Web based malware URL Scanner
- After Stuxnet, its Duqu now!
- Global Security Map
- Pwning a Spammer's Keylogger
- Performing Android malware analysis
- Detecting Known Malware Processes Using Nessus
- Tiny banking trojan can do a lot of damage
- Blackhole Exploit Kit Gets an Upgrade: Pseudo-random Domains
- Fakenet
- Malware Hunting with the Sysinternals Tools
- Quick utilities for malware analysis
- Skype worm analysis
- Detecting whether operating system is running in a virtual environment
- Deobfuscating Potentially Malicious URLs
- The Ultimate thread for Malware repositories
- Practical Malware Analysis - labs and fakenet
- Analysis of the FBI Tor Malware
- Live data visualization of global DDoS attacks
- Hunting Beasts..."vinnu"
- Malware Emulation - An Introduction
- Exploring the Blackhole Exploit Kit by Sophos
- Anti-debugging, Anti-evasion and Anti-vm tricks used by malware