http://securitytrainings.net/hunting-rootkit-dark-corners-memory/
http://securitytrainings.net/hunting-ghost-rat-using-memory-forensics/?utm_content=bufferb8e5b&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
http://securitytrainings.net/hunting-rootkit-dark-corners-memory/
http://securitytrainings.net/hunting-ghost-rat-using-memory-forensics/?utm_content=bufferb8e5b&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer