Computer Science and Engineering
Introductory Cyber Security Lab
Experiments
Aim
Theory
Pretest
Procedure
Simulation
Posttest
References
Contributors
Feedback
Aim
Theory
Pretest
Procedure
Simulation
Posttest
References
Contributors
Feedback
Identifying Libraries and Network Connections in Malicious Binaries
Executable Files Analysis and Capabilities Detection using capa (Mandiant)
Beginning Malware Analysis
capa – Automatically Identify Malware Capabilities