Apress / malware-analysis-detection-engineeringLinks
Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha
☆120Updated 2 years ago
Alternatives and similar repositories for malware-analysis-detection-engineering
Users that are interested in malware-analysis-detection-engineering are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆57Updated last year
- Malware Data Science Reading Diary / Notes☆128Updated 6 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Malware Analysis Techniques, published by Packt☆73Updated 2 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆43Updated 2 years ago
- Mastering Malware Analysis, published by Packt☆39Updated 2 years ago
- Malware Analysis Exercise Samples and Resources☆45Updated 2 weeks ago
- Python scripts for Malware Bazaar☆154Updated last year
- Various capabilities for static malware analysis.☆78Updated 11 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆116Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆181Updated 3 weeks ago
- A curated list of malware repositories, trackers and malware analysis tools☆86Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆106Updated 2 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- MAEC Schemas and Schema Development☆88Updated 5 years ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Malware Sandboxes & Malware Source☆96Updated 8 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- This repository contains relevant samples and data related to the ELF Malware Analysis 101 articles☆45Updated 3 years ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆86Updated 3 years ago
- ☆150Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆229Updated 2 years ago
- A guide on how to write fast and memory friendly YARA rules☆149Updated 5 months ago
- Mindmaps for threat hunting - work in progress.☆150Updated 3 years ago
- Cuckoo running in a nested hypervisor☆128Updated 5 years ago
- Research indicators and detection rules☆67Updated last year
- Simplified MITRE Use Cases, it describes the Attack and Detection☆46Updated 4 years ago
- Hatching Triage public command-line utility and API library.☆69Updated last year
- ☆208Updated last month