Menu
Home
About us
People
Contact
Research
Research & Innovation Projects
Crypto-Ransomware Attacks Post-Execution Response (CRAPER)
Malware Indicators of compromise enhanced by Memory Forensic Analysis (MIMFA)
EINA UNIZAR Cybersecurity Strategic Project
CyberCamp UNIZAR
International Cybersecurity Chair UNIZAR
Publications
Tools
Open Positions
Acknowledgements
Blog
Home
About us
People
Contact
Research
Research & Innovation Projects
Crypto-Ransomware Attacks Post-Execution Response (CRAPER)
Malware Indicators of compromise enhanced by Memory Forensic Analysis (MIMFA)
EINA UNIZAR Cybersecurity Strategic Project
CyberCamp UNIZAR
International Cybersecurity Chair UNIZAR
Publications
Tools
Open Positions
Acknowledgements
Blog
Tag: Windows
March 22, 2023
Module Extraction and DLL Hijacking Detection via Single or Multiple Memory Dumps
March 29, 2022
Recovering Data from the Memory of Telegram Desktop (and other IM Applications)
October 6, 2021
Disabling DEP in Windows 7 using rop3
July 22, 2021
Writing a Volatility 3 Plugin
May 28, 2021
How powerful are Return Oriented Programming attacks?
April 22, 2021
Reverse-Engineering the String Decryption Algorithm of Mekotio
February 1, 2021
Unrelocating Windows Modules (II)
January 19, 2021
Unrelocating Windows Modules (I)
June 30, 2020
Authenticode (II): Verifying Authenticode with OpenSSL
June 9, 2020
Authenticode (I): Understanding Windows Authenticode
© 2024
RME-DisCo Research Group
Theme by
Anders Norén
—
Up ↑