How to detect a rootkit through memory analysis - Stuxnet
How to Detect Rootkit Malware on Windows PC using PowerShell?
Rapid Windows Memory Analysis with Volatility 3
MALWARE Analysis with Wireshark // TRICKBOT Infection
Effective DFIR Triage Techniques to Detect Modern Rootkits
The Rootkit Paradox
Automated in-memory malware/rootkit detection via binary analysis and machine learning
Unveiling the kernel: rootkit discovery using selective automated kernel memory differencing
Rootkits As Fast As Possible
Detect Kernel-Mode Rootkits via Real Time Logging & Controlling Memory Access
Analyzing DKOM rootkit in Memory Forensics
Investigating Malware Using Memory Forensics - A Practical Approach
Using WindowsSCOPE to Reverse Engineer and Analyze the Shadow Walker Rootkit Cyber Attack
BSidesCharm 2023 - Detecting and Triaging Modern Windows Rootkits - Andrew Case
Running and Detecting a FreeBSD Rootkit
Memory Diff Analysis of Average Coder Linux Rootkit
Memory Diff Analysis of Linux Rootkit Xingiquan
DEF CON 32 - Defeating EDR Evading Malware with Memory Forensics - Case, Sellers, Richard, et al.
Reversing and Malware Analysis Training - Rootkit Analysis Demo1 (mader)
Volatility 2.4 at Blackhat Arsenal "Reverse Engineering Rootkits"