Apress / malware-analysis-detection-engineeringLinks
Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha
☆118Updated 2 years ago
Alternatives and similar repositories for malware-analysis-detection-engineering
Users that are interested in malware-analysis-detection-engineering are comparing it to the libraries listed below
Sorting:
- Malware Analysis Exercise Samples and Resources☆41Updated last week
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- Malware Data Science Reading Diary / Notes☆127Updated 6 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆41Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- YARA rule analyzer to improve rule quality and performance☆101Updated last month
- Malware Analysis Techniques, published by Packt☆70Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- Research indicators and detection rules☆66Updated last year
- This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.☆114Updated last year
- BlackBerry Threat Research & Intelligence☆98Updated last year
- Various capabilities for static malware analysis.☆78Updated 9 months ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆104Updated 3 weeks ago
- A guide on how to write fast and memory friendly YARA rules☆143Updated 3 months ago
- Collection of resources that are made by the Malware Research community☆226Updated last year
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- Security ML models encoded as Yara rules☆214Updated last year
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- Mindmaps for threat hunting - work in progress.☆151Updated 3 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Malware Sandboxes & Malware Source☆95Updated 8 years ago
- Valhalla API Client☆70Updated 2 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- File analysis and management framework.☆83Updated last year
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆179Updated 4 months ago
- Exercise writeups from the book Practical Malware Analysis.☆227Updated last year
- MAEC Schemas and Schema Development☆87Updated 5 years ago
- Notes and IoCs of fresh malware☆58Updated 11 months ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆139Updated last year