Masters Thesis (Dynamic Behavioural Analysis of Malware via Network Forensics:

Link

Just to note all malware analysis is done without consideration of attribution to any particular group or country:
Reversing Ransomware (work in progress)

Security links:
Pentesting Notes Privilege Escalation Notes 6 Years In Pentesting
Anti-Forensics:
Phrack, Linux Anti-Forensics
Phishing:
Phishing Phishing w/ SSL

Buffer Overflow Training Instructions:
To be added to if/when I sit OSCE:
buffer overflows

Hack The Box: