Apress / malware-analysis-detection-engineeringLinks
Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha
☆123Updated 2 years ago
Alternatives and similar repositories for malware-analysis-detection-engineering
Users that are interested in malware-analysis-detection-engineering are comparing it to the libraries listed below
Sorting:
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 3 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆62Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆182Updated 3 weeks ago
- A guide on how to write fast and memory friendly YARA rules☆154Updated 8 months ago
- Malware Analysis Techniques, published by Packt☆76Updated 2 years ago
- Malware Sandboxes & Malware Source☆101Updated 8 years ago
- Python scripts for Malware Bazaar☆155Updated last year
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆45Updated 2 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆107Updated 5 months ago
- A curated list of malware repositories, trackers and malware analysis tools☆88Updated 2 years ago
- ☆158Updated 3 years ago
- Malware Analysis Exercise Samples and Resources☆51Updated 2 weeks ago
- Mastering Malware Analysis, published by Packt☆40Updated 2 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆118Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆135Updated last year
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆47Updated 3 years ago
- Research notes☆128Updated 10 months ago
- Mindmaps for threat hunting - work in progress.☆151Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆140Updated last year
- repository of tools & resources of the MMD team☆136Updated 3 years ago
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆118Updated last year
- JPCERT/CC public YARA rules repository☆110Updated 10 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆51Updated 5 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- MAEC Schemas and Schema Development☆88Updated 5 years ago