Dump-GUY / Malware-analysis-and-Reverse-engineering
Some of my publicly available Malware analysis and Reverse engineering.
☆791Updated 8 months ago
Alternatives and similar repositories for Malware-analysis-and-Reverse-engineering:
Users that are interested in Malware-analysis-and-Reverse-engineering are comparing it to the libraries listed below
- Dynamic unpacker based on PE-sieve☆705Updated last week
- A Pin Tool for tracing API calls etc☆1,380Updated 2 weeks ago
- Standard collection of rules for capa: the tool for enumerating the capabilities of programs☆566Updated 2 weeks ago
- A not so awesome list of malware gems for aspiring malware analysts☆804Updated 2 years ago
- Assortment of hashing algorithms used in malware☆345Updated this week
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆731Updated 3 years ago
- PE-bear (builds only)☆773Updated last year
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆542Updated last year
- Collection of resources that are made by the Malware Research community☆220Updated last year
- A Binary Genetic Traits Lexer Framework☆487Updated last week
- MBC content in markdown☆407Updated last month
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆626Updated 7 months ago
- Collection of various malicious functionality to aid in malware development☆1,589Updated 11 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,516Updated last year
- A Windows kernel-mode rootkit that abuses legitimate communication channels to control a machine.☆694Updated 4 years ago
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆307Updated 2 years ago
- A curated list of IDA x64DBG, Ghidra and OllyDBG plugins.☆1,340Updated 8 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,225Updated last week
- Living Off The Land Drivers☆1,107Updated 3 weeks ago
- AV/EDR evasion via direct system calls.☆1,839Updated 2 years ago
- The multi-platform memory acquisition tool.☆741Updated 2 months ago
- Moneta is a live usermode memory analysis tool for Windows with the capability to detect malware IOCs☆731Updated 11 months ago
- Quickly debug shellcode extracted during malware analysis☆582Updated last year
- Win32 and Kernel abusing techniques for pentesters☆940Updated last year
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆575Updated 9 months ago
- Windows kernel and user mode emulation.☆1,576Updated this week
- Bringing you the best of the worst files on the Internet.☆317Updated 3 years ago
- ☆740Updated last year
- Research code & papers from members of vx-underground.☆1,185Updated 3 years ago
- An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…☆777Updated last year