Dump-GUY / Malware-analysis-and-Reverse-engineering
Some of my publicly available Malware analysis and Reverse engineering.
☆763Updated 6 months ago
Alternatives and similar repositories for Malware-analysis-and-Reverse-engineering:
Users that are interested in Malware-analysis-and-Reverse-engineering are comparing it to the libraries listed below
- Dynamic unpacker based on PE-sieve☆663Updated 9 months ago
- A Pin Tool for tracing API calls etc☆1,337Updated last week
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆727Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆798Updated last year
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆528Updated 11 months ago
- Resources for Windows exploit development☆1,538Updated 2 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆609Updated 5 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,491Updated 11 months ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆685Updated 4 years ago
- Assortment of hashing algorithms used in malware☆337Updated 5 months ago
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆305Updated 2 years ago
- Living Off The Land Drivers☆1,056Updated 2 months ago
- ☆732Updated last year
- AV/EDR evasion via direct system calls.☆1,822Updated last year
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆390Updated 5 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆707Updated 9 months ago
- PE-bear (builds only)☆772Updated last year
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆757Updated 10 months ago
- Collection of resources that are made by the Malware Research community☆220Updated last year
- Important notes and topics on my journey towards mastering Windows Internals☆348Updated 7 months ago
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆582Updated 7 months ago
- Collection of various malicious functionality to aid in malware development☆1,520Updated 9 months ago
- PoCs and tools for investigation of Windows process execution techniques☆884Updated 3 weeks ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆575Updated 7 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,057Updated this week
- Windows kernel and user mode emulation.☆1,534Updated 8 months ago
- A Binary Genetic Traits Lexer Framework☆430Updated this week
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,099Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆549Updated last week