4. Al KhaserPublic malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
5. binary-auditing-solutionsLearn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.