What people think about ProcDOT. This section is dedicated to all those great people out there supporting ProcDOT in spreading “the word”. Thank you! Note: If you also mentioned ProcDOT in any way and want to be listed here, please drop me a line with the according link(s). Fully dedicated articles, reviews, posts ... Russ McRee dedicates 2013 June’s toolsmith article to ProcDOT. [Link] [PDF] Pablo Ramos, security researcher at ESET reviews ProcDOT in their technical blog (Spanish!). [Link] Some wiki page on aLDeID about ProcDOT and how to use it. [Link] SystemExposed reviews ProcDOT in his/her technical blog (Spanish!). [Link] COUNT UPON SECURITY reviews ProcDOT as a part of REMnux. [Link] Pavel Bašta (CZ.NIC) blogs about ProcDOT. [Link] Blog posts, use/show cases, short references ... Russ McRee in his role as one of SANS’ incident handlers mentions ProcDOT in his according diary. [Link] LogRhythm Labs Advanced R & D analyzing a Betabot variant using ProcDOT. [Link] Sébastien Damaye, A small post about ProcDOT further linking to the mentioned wiki page on aLDeID. [Link] Information Technology Information Magazine mentions ProcDOT. [Link] p4r4n0id mentions ProcDOT on KernelMode.info. [Link] Chris John Riley mentions ProcDOT in his blog. [Link] ProcDOT gets mentioned on elhacker.net’s forum by moderator karmany (Spanish!). [Link] ProcDOT gets mentioned along with Noriben on Wilders Security Forums. [Link] Michael Boman mentions ProcDOT as an inspiration for his further work on call graphing. [Link] Corey Harrel mentiones ProcDOT along with other forensic/malware analysis tools on journeyintoir blog. [Link] CyberOperations blogs about “SSH, File Servers, Operational Awareness” and gives a quick summary about ProcDOT. [Link] COUNT UPON SECURITY blogs about recent attacks using malicious Office documents and uses ProcDOT to do the analysis. [Link] Ran2 via espionageware@blogspot discusses some (re-)tools and their usage and benefits mentioning ProcDOT. [Link] 909 via 909research analyzes PlugX malware using/mentioning ProcDOT. [Link] Bart Blaze blogs about yet another ransomware variant using ProcDOT. [Link] Marion Marschalek talks/writes (slidedeck!) about “Small Data Analysis” at RSA conference 2014 (Asia Pacific & Japan) featuring ProcDOT. [PDF] Karel Nykles talks/writes (slidedeck!) about malware analysis and according tools mentioning ProcDOT (Czech!). [PDF] OSSIR - Groupe Paris talks/writes (slidedeck!) about IT security news mentioning ProcDOT (French!). [PDF] Andrew Dove (Airbus Cyber Security) blogs about behavioural analyzing Kofter using ProcDOT. [Link] Malware-Analyzer.com mentiones/lists ProcDOT. [Link] haloforensics.com blogs about REMnux mentioning ProcDOT. [Link] myexperimentswithmalware blogs about “Dumping a RAT” mentioning ProcDOT. [Link] Danielle Eve gives a small introduction to malware reverse engineering mentioning, explaining, and using ProcDOT multiple times. [Link] [Link] Specials ... ProcDOT is part of Lenny Zeltser’s Linux distribution for reverse engineering and malware analysis “REMnux”. [Link] ProcDOT is officially mentioned in SANS reverse engineering and malware analysis course (Thx Lenny!).
References
logotype
ProcDOT - Visual Malware Analysis Christian Wojner, 2022