A repo to support the book
Adversarial Tradcraft in Cybersecurity: Offense versus defense in real-time computer conflict
- Chapter 1: Theory on Adversarial Operations and Principles of Computer Conflict
- Chapter 2: Preparing for Battle
- Chapter 3: Invisible is Best (Operating in Memory)
- Chapter 4: Blending In
- Chapter 5: Active Manipulation
- Chapter 6: Real-Time Conflict
- Chapter 7: The Research Advantage
- Chapter 8: Clearing the Field
- References
- Greetz