Dump-GUY / Malware-analysis-and-Reverse-engineeringLinks
Some of my publicly available Malware analysis and Reverse engineering.
☆809Updated last year
Alternatives and similar repositories for Malware-analysis-and-Reverse-engineering
Users that are interested in Malware-analysis-and-Reverse-engineering are comparing it to the libraries listed below
Sorting:
- Dynamic unpacker based on PE-sieve☆732Updated last week
- A Pin Tool for tracing API calls etc☆1,442Updated this week
- A not so awesome list of malware gems for aspiring malware analysts☆808Updated 2 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆569Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆639Updated 10 months ago
- Windows kernel and user mode emulation.☆1,658Updated 2 months ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆807Updated last year
- Malware samples, analysis exercises and other interesting resources.☆1,557Updated last year
- High Octane Triage Analysis☆728Updated last week
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆321Updated 2 months ago
- The multi-platform memory acquisition tool.☆797Updated 6 months ago
- A Binary Genetic Traits Lexer Framework☆494Updated 3 months ago
- PE-bear (builds only)☆779Updated 2 years ago
- Assortment of hashing algorithms used in malware☆362Updated last week
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆740Updated 3 years ago
- Collection of resources that are made by the Malware Research community☆226Updated last year
- Research code & papers from members of vx-underground.☆1,244Updated 3 years ago
- Resources for Windows exploit development☆1,583Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,168Updated last week
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆587Updated last week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,323Updated last week
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆409Updated 10 months ago
- MBC content in markdown☆452Updated 2 months ago
- A curated list of awesome resources related to executable packing☆1,341Updated 2 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆581Updated last year
- A curated list of awesome reverse engineering resources for various topics☆531Updated 10 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,139Updated this week
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,395Updated last year
- Binary Ninja plugin to identify obfuscated code and other interesting code constructs☆626Updated 2 months ago
- Collection of various malicious functionality to aid in malware development☆1,669Updated last year