Brandon-Everhart / Practical-Malware-AnalysisLinks
Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.
☆12Updated 7 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- This repo contain Android malware samples and analysis☆13Updated 4 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- ☆28Updated 5 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- Sources code extracted from malwares for analysis☆39Updated 2 years ago
- ☆36Updated 5 years ago
- SLAE x86 from Pentester Academy☆15Updated 5 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- qiling framework examples☆16Updated 3 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 6 years ago
- A repository for my conference presentations☆35Updated 5 years ago
- Maltego transforms to pivot between PE files based on their VirusTotal codeblocks☆18Updated 4 years ago
- ☆19Updated 3 years ago
- ☆20Updated 5 years ago
- Flare-On solutions☆36Updated 5 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Updated 4 years ago
- Links or additional data to some researches☆14Updated 6 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- ☆46Updated 6 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- Using Spotify Playlists as Malware CDN☆27Updated 4 years ago
- ☆21Updated 5 years ago