Dump-GUY / Malware-analysis-and-Reverse-engineering
Some of my publicly available Malware analysis and Reverse engineering.
☆808Updated 10 months ago
Alternatives and similar repositories for Malware-analysis-and-Reverse-engineering:
Users that are interested in Malware-analysis-and-Reverse-engineering are comparing it to the libraries listed below
- Dynamic unpacker based on PE-sieve☆725Updated last month
- A Pin Tool for tracing API calls etc☆1,413Updated 2 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆739Updated last year
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆635Updated 9 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆558Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆805Updated 2 years ago
- PE-bear (builds only)☆776Updated last year
- Resources for Windows exploit development☆1,569Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆405Updated 9 months ago
- A Binary Genetic Traits Lexer Framework☆490Updated 2 months ago
- Living Off The Land Drivers☆1,148Updated 3 weeks ago
- Collection of resources that are made by the Malware Research community☆225Updated last year
- ☆750Updated last year
- Assortment of hashing algorithms used in malware☆357Updated 2 weeks ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆312Updated last month
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated 11 months ago
- AV/EDR evasion via direct system calls.☆1,864Updated 2 years ago
- This program is designed to demonstrate various process injection techniques☆1,136Updated last year
- Windows kernel and user mode emulation.☆1,636Updated 3 weeks ago
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆700Updated 4 years ago
- A curated list of awesome resources related to executable packing☆1,312Updated 3 weeks ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆1,133Updated last year
- Great explanation of Process Hollowing (a Technique often used in Malware)☆1,321Updated last year
- Research code & papers from members of vx-underground.☆1,217Updated 3 years ago
- ☆1,634Updated 7 months ago
- High Octane Triage Analysis☆723Updated this week
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,282Updated this week
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆647Updated 8 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,544Updated last year