Find malware running from temporary directories using procfs.
Find masquerading processes using procfs.
Toggle Safe Browsing in Google Chrome.
Accessing Alternate Data Streams on VMDK Images on Linux.
Review of Malware Data Science: Attack Detection and Attribution
My review of SEKTOR7 Institute's Red Team Operator, Windows Persistence course.
Review of RED TEAM Operator: Malware Development Essentials Course by SEKTOR7 Institute.
I was victimized by gscript at a CTF. Here is how I dealt with it.
Harden bash shells against pesky red teamers.