Dump-GUY / Malware-analysis-and-Reverse-engineeringLinks
Some of my publicly available Malware analysis and Reverse engineering.
☆933Updated last year
Alternatives and similar repositories for Malware-analysis-and-Reverse-engineering
Users that are interested in Malware-analysis-and-Reverse-engineering are comparing it to the libraries listed below
Sorting:
- Dynamic unpacker based on PE-sieve☆796Updated 4 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆828Updated 3 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆733Updated 2 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆684Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,607Updated 2 years ago
- Resources for Windows exploit development☆1,648Updated 4 years ago
- A Pin Tool for tracing API calls etc☆1,612Updated 2 months ago
- MBC content in markdown☆522Updated 7 months ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆373Updated 10 months ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆685Updated last week
- Collection of resources that are made by the Malware Research community☆236Updated 2 years ago
- Windows kernel and user mode emulation.☆1,837Updated this week
- Assortment of hashing algorithms used in malware☆389Updated 3 weeks ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆752Updated 4 years ago
- A Binary Genetic Traits Lexer Framework☆522Updated 5 months ago
- Research code & papers from members of vx-underground.☆1,351Updated 4 years ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,263Updated this week
- High Octane Triage Analysis☆808Updated this week
- Materials for Windows Malware Analysis training (volume 1)☆2,024Updated last year
- PE-bear (builds only)☆783Updated 2 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆441Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587Updated last year
- Collection of various malicious functionality to aid in malware development☆1,840Updated last year
- Exercise writeups from the book Practical Malware Analysis.☆245Updated 2 years ago
- Important notes and topics on my journey towards mastering Windows Internals☆426Updated last year
- Win32 and Kernel abusing techniques for pentesters☆972Updated 2 years ago
- The multi-platform memory acquisition tool.☆942Updated 3 months ago
- Living Off The Land Drivers☆1,386Updated this week
- A curated list of awesome resources related to executable packing☆1,529Updated last month
- Code snips and notes☆140Updated 3 years ago