![]() Music |
![]() Video |
![]() Movies |
![]() Chart |
![]() Show |
![]() |
Rootkits (Part 8): Defense via Hook Detection (Sourcefire) View |
![]() |
Rootkits (Part 6): Defense via Cross-View Detection (Sourcefire) View |
![]() |
Rootkits (Part 7): Signature-Based Defense (Sourcefire) View |
![]() |
Rootkits (Part 4): Import Address Table Hooking (Sourcefire) View |
![]() |
Rootkits (Part 5): Inline Function Patching -- Detours (Sourcefire) View |
![]() |
Almost invisible rootkit for x64: IRP hook kernel keylogger part 3 (Microwave89) View |
![]() |
Almost invisible rootkit for x64: IRP hook kernel keylogger part 1 (Microwave89) View |
![]() |
Rootkits (Part 3): Direct Kernel Object Manipulation (Sourcefire) View |
![]() |
Rootkits (Part 2): High-Level Techniques (Sourcefire) View |
![]() |
Almost invisible rootkit for x64: IRP hook kernel keylogger part 2 (Microwave89) View |