Brandon-Everhart / Practical-Malware-AnalysisLinks
Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.
☆12Updated 7 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- This repo contain Android malware samples and analysis☆13Updated 4 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- Sources code extracted from malwares for analysis☆38Updated 2 years ago
- ☆28Updated 5 years ago
- ☆18Updated 3 years ago
- qiling framework examples☆16Updated 3 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Updated 4 years ago
- Solution for Ricardo Narvaja's C++ Exploiting Exercise☆13Updated 5 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆73Updated 4 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Experimental: Windows .text section compare - disk versus memory☆14Updated 10 years ago
- ☆20Updated 5 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 4 years ago
- CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free☆15Updated 5 years ago
- Dhkos ctf çözümleri☆8Updated 6 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated last year
- My Shellcode Archive☆28Updated 8 years ago
- ☆25Updated last year
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆21Updated 4 years ago
- ☆28Updated 4 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13Updated 6 years ago
- Our team's CTF writeups☆10Updated 5 years ago
- ActiveMime File Format Documentation☆18Updated 4 years ago
- ☆43Updated 6 years ago
- Using Spotify Playlists as Malware CDN☆27Updated 4 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago