Apress / malware-analysis-detection-engineeringLinks
Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha
☆124Updated 2 years ago
Alternatives and similar repositories for malware-analysis-detection-engineering
Users that are interested in malware-analysis-detection-engineering are comparing it to the libraries listed below
Sorting:
- Malware Analysis Techniques, published by Packt☆78Updated 3 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆121Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- Mastering Malware Analysis, published by Packt☆41Updated 3 years ago
- Malware Sandboxes & Malware Source☆109Updated 8 years ago
- repository of tools & resources of the MMD team☆138Updated 3 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆44Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 5 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆94Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆115Updated 3 weeks ago
- A guide on how to write fast and memory friendly YARA rules☆164Updated 11 months ago
- ☆53Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆144Updated 2 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆184Updated 4 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- ☆212Updated last week
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆120Updated 2 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆48Updated 3 years ago
- Various capabilities for static malware analysis.☆79Updated last year
- Python scripts for Malware Bazaar☆157Updated last year
- Research notes☆131Updated last year
- ☆163Updated 3 years ago
- Mindmaps for threat hunting - work in progress.☆152Updated 3 years ago
- A YARA rules repository continuously updated for monitoring the old and new threats from articles, incidents responses ...☆141Updated 2 years ago
- Exercise writeups from the book Practical Malware Analysis.☆244Updated 2 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆131Updated 2 years ago