Dump-GUY / Malware-analysis-and-Reverse-engineeringLinks
Some of my publicly available Malware analysis and Reverse engineering.
☆906Updated last year
Alternatives and similar repositories for Malware-analysis-and-Reverse-engineering
Users that are interested in Malware-analysis-and-Reverse-engineering are comparing it to the libraries listed below
Sorting:
- Dynamic unpacker based on PE-sieve☆783Updated 2 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆707Updated last week
- Collection of resources that are made by the Malware Research community☆234Updated 2 years ago
- Resources for Windows exploit development☆1,629Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆822Updated 2 years ago
- Research code & papers from members of vx-underground.☆1,326Updated 4 years ago
- A Pin Tool for tracing API calls etc☆1,587Updated 2 weeks ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆674Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,591Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆368Updated 8 months ago
- Windows kernel and user mode emulation.☆1,802Updated last week
- PE-bear (builds only)☆780Updated 2 years ago
- A Binary Genetic Traits Lexer Framework☆517Updated 3 months ago
- Assortment of hashing algorithms used in malware☆387Updated last month
- MBC content in markdown☆499Updated 5 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆750Updated 4 years ago
- A curated list of awesome resources related to executable packing☆1,489Updated 5 months ago
- Collection of various malicious functionality to aid in malware development☆1,801Updated last year
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆659Updated last week
- Living Off The Land Drivers☆1,346Updated this week
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆435Updated last year
- Exercise writeups from the book Practical Malware Analysis.☆240Updated 2 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,015Updated last year
- Bringing you the best of the worst files on the Internet.☆342Updated 4 years ago
- ☆550Updated 3 years ago
- Research notes☆131Updated last year
- High Octane Triage Analysis☆803Updated last week
- A PowerShell script that attempts to help malware analysts hide their VMware Windows VM's from malware that may be trying to evade analys…☆416Updated 10 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆790Updated last year
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,245Updated 3 weeks ago