0x4143 / malware-gemsLinks
A not so awesome list of malware gems for aspiring malware analysts
☆809Updated 2 years ago
Alternatives and similar repositories for malware-gems
Users that are interested in malware-gems are comparing it to the libraries listed below
Sorting:
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆779Updated 7 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,564Updated last year
- Everything related to Linux Forensics☆702Updated last year
- Some of my publicly available Malware analysis and Reverse engineering.☆814Updated last year
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆911Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆708Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Resources for Windows exploit development☆1,591Updated 3 years ago
- ☆1,050Updated last year
- MBC content in markdown☆457Updated 2 weeks ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆647Updated 11 months ago
- My curated list of awesome links, resources and tools on infosec related topics☆1,116Updated 3 months ago
- Resources for learning about Exploit Development☆392Updated 4 years ago
- Materials for Windows Malware Analysis training (volume 1)☆1,991Updated 11 months ago
- Research code & papers from members of vx-underground.☆1,252Updated 3 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,116Updated 4 years ago
- Malware sample library.☆576Updated last year
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆898Updated 5 years ago
- List of Awesome Advanced Windows Exploitation References☆1,497Updated 3 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,213Updated 4 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- Labs for Practical Malware Analysis & Triage☆982Updated 2 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,178Updated last month
- ☆543Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆227Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆600Updated last week
- Defences against Cobalt Strike☆1,288Updated 2 years ago
- ☆516Updated 8 months ago
- Bringing you the best of the worst files on the Internet.☆330Updated 4 years ago
- Binaries for the book Practical Malware Analysis☆1,294Updated 3 years ago