From 1cd4c4c578beb456c8cab241eb1722bfb846f209 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Sat, 28 Jul 2018 11:14:20 +0000 Subject: [PATCH] Detection and recovery of NSA's covered up tracks --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 4dae604..d271004 100644 --- a/README.md +++ b/README.md @@ -94,6 +94,7 @@ My curated list of awesome links, resources and tools - [Automating large-scale memory forensics](https://medium.com/@henrikjohansen/automating-large-scale-memory-forensics-fdc302dc3383) - [Carving EVTX](https://rawsec.lu/blog/posts/2017/Jun/23/carving-evtx/) - [Certificate Chain Cloning and Cloned Root Trust Attacks](https://posts.specterops.io/code-signing-certificate-cloning-attacks-and-defenses-6f98657fc6ec) +- [Detection and recovery of NSA’s covered up tracks](https://blog.fox-it.com/2017/12/08/detection-and-recovery-of-nsas-covered-up-tracks/) - [Detecting DDE in MS Office documents with YARA rules](https://blog.nviso.be/2017/10/11/detecting-dde-in-ms-office-documents/) - [Forensic Analysis of Systems that have Windows Subsystem for Linux Installed](http://blog.1234n6.com/2017/10/forensic-analysis-of-systems-with.html) - [Getting to the Bottom of CVE-2018-0825 Heap Overflow Buffer](https://www.ixiacom.com/company/blog/getting-bottom-cve-2018-0825-heap-overflow-buffer)