/exp-malicious-binary-analysis-au

This experiment belongs to Introductory Cyber Security Lab Amrita. Name: Experiment to understand the libraries a malicious binary uses to figure out its functionality and then to figure out the exact domain/IP it connects to

Primary LanguageHTMLGNU Affero General Public License v3.0AGPL-3.0

Introduction

Discipline Fill your discipline name here
Lab Fill your lab name here
Experiment Fill your experiment name and number here

About the Experiment

Fill a brief description of this experiment here

Name of Developer Fill the name of experiment owner here
Institute
Email id
Department

Contributors List

SrNo Name Faculty or Student Department Institute Email id
1 . . . . .
2 . . . . .