Brandon-Everhart / Practical-Malware-AnalysisLinks
Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.
☆12Updated 7 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- Liberating dem proprietary APT implants☆20Updated 5 years ago
- Brute-force script for finding azorult XOR key.☆14Updated 6 years ago
- This repo contain Android malware samples and analysis☆13Updated 4 years ago
- ☆28Updated 5 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- ☆14Updated 7 years ago
- Remote Code Execution vulnerability on ArcSight Logger☆20Updated 4 years ago
- Simple shellcode injector.☆14Updated 6 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- qiling framework examples☆16Updated 3 years ago
- Scripts targeting specific families☆13Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- ☆53Updated 8 years ago
- Sources code extracted from malwares for analysis☆40Updated 2 years ago
- ☆43Updated 6 years ago
- ☆46Updated 6 years ago
- ☆20Updated 6 years ago
- ☆36Updated 7 years ago
- Sentello is python script that simulates the anti-evasion and anti-analysis techniques used by malware.☆74Updated 4 years ago
- generate yara-androguard report on your local and scan☆12Updated 6 years ago
- ☆24Updated 7 years ago
- My Shellcode Archive☆29Updated 8 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Updated 6 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆20Updated 5 years ago
- ☆27Updated 5 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- ☆19Updated 3 years ago