[자료] 대규모 서비스를 지탱하는 기술
https://www.slideshare.net/charsyam2/massive-service-basic?fbclid=IwAR1S1pQCTyslMd1smErQbUBHOmADQG3zde9xym4_bTULKvbHtTz_LSQNSvg https://www.slideshare.net/charsyam2/how-to-build-massive-service-for-advance
https://www.slideshare.net/charsyam2/massive-service-basic?fbclid=IwAR1S1pQCTyslMd1smErQbUBHOmADQG3zde9xym4_bTULKvbHtTz_LSQNSvg https://www.slideshare.net/charsyam2/how-to-build-massive-service-for-advance
https://www.peerlyst.com/posts/how-to-build-a-linux-automated-malware-analysis-lab-chiheb-chebbi?fbclid=IwAR0A4xVM9-jBgla2jyu-qoTM8RBbCh32ibKRoipyjuTkJC7ukO42flVb7jM AbstractHi Peerlysters ! This article is going to be like a small guide to give you some glimpses, ideas and suggestions to learn how tobuild a Linux automated Analysis lab using built-in Linux commands, python and open source proje..
https://github.com/Microsoft/ProcDump-for-Linux?fbclid=IwAR3NKfX_eVQxCugpvhgiKc8wPOzjQzAWmrY19gDTed2lvIeNxZAHhITUa4Y
https://github.com/random-robbie/My-Shodan-Scripts?fbclid=IwAR2FMnUQmD_iTFlDF9kr8KjY67Fbir4UMSJFXvSv2c0D0aQZTGMJlzI6H3k
https://blog.1234n6.com/2018/10/available-artifacts-evidence-of.html?m=1&fbclid=IwAR195Ch1J6N1TGYFHUY375ZjPKGmxIshQaVzGXSsAkwwnZM9_Zyyio89psQ This week I have been working a case where I was required to identify users on a Windows Server 2003 system who had knowledge of, or had run, a particular unauthorised executable. As such, I found myself wracking my brain for all the user attributable arti..
General SamplestheZoo theZoo is a project created to make the possibility of malware analysis open and available to the public.contagio Contagio is a collection of the latest malware samples, threats, observations, and analyses.Hybrid Analysis Free malware analysis service powered by Payload Security. Using this service you can submit files for in-depth static and dynamic analysis. You can also ..
https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process. Process injection improves stealth, and some techniques also achieve persi..