Apress / malware-analysis-detection-engineeringLinks
Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha
☆124Updated 2 years ago
Alternatives and similar repositories for malware-analysis-detection-engineering
Users that are interested in malware-analysis-detection-engineering are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Updated 3 years ago
- Resources for learning malware analysis and reverse engineering☆139Updated last year
- Malware Analysis Techniques, published by Packt☆77Updated 2 years ago
- Malware Data Science Reading Diary / Notes☆129Updated 6 years ago
- Mastering Malware Analysis - Second Edition, published by Packt.☆44Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆182Updated 2 months ago
- Mastering Malware Analysis, published by Packt☆41Updated 2 years ago
- Python scripts for Malware Bazaar☆157Updated last year
- Malware Analysis Exercise Samples and Resources☆52Updated last week
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆119Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- Malware Sandboxes & Malware Source☆102Updated 8 years ago
- The Windows Malware Analysis Reversing Core Tools☆97Updated 4 years ago
- A guide on how to write fast and memory friendly YARA rules☆157Updated 9 months ago
- Further investigation in to APT campaigns disclosed by private security firms and security agencies☆87Updated 3 years ago
- Exercise writeups from the book Practical Malware Analysis.☆240Updated 2 years ago
- A collection of resources if you want to get into malware research. Pull requests are very welcome.☆120Updated 6 years ago
- Research notes☆131Updated last year
- Understanding and analyzing carrier files workshop repo☆51Updated 6 years ago
- A curated list of malware repositories, trackers and malware analysis tools☆91Updated 2 years ago
- ☆67Updated 2 years ago
- YARA rule metadata specification and validation utility / Spécification et validation pour les règles YARA☆113Updated 6 months ago
- ☆53Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 5 months ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆47Updated 5 years ago
- ☆212Updated this week
- MAEC Schemas and Schema Development☆89Updated 5 years ago