Grazfather / PracticalMalwareLabs
Keep track of the labs from the book "Practical Malware Analysis"
☆168Updated 5 years ago
Alternatives and similar repositories for PracticalMalwareLabs:
Users that are interested in PracticalMalwareLabs are comparing it to the libraries listed below
- Exploiting challenges in Linux and Windows☆122Updated 5 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- A tool to detect and crash Cuckoo Sandbox☆292Updated 8 months ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 7 years ago
- Various snippets created during malware analysis☆458Updated 2 years ago
- Content from presentation at BHUSA 2017☆180Updated 7 years ago
- flare-dbg is a project meant to aid malware reverse engineers in rapidly developing debugger scripts.☆150Updated 7 years ago
- Fork of mona.py with x64dbg support☆102Updated 2 years ago
- Python solutions for the HackSysTeam Extreme Vulnerable Driver☆151Updated 4 years ago
- Miscellaneous tools written in Python, mostly centered around shellcodes.☆146Updated 9 years ago
- A repository of challenges from various CTF competitions.☆155Updated 10 years ago
- Automated malware unpacker☆119Updated 9 years ago
- Exploitation and Mitigation Slides☆127Updated 9 months ago
- Automated Exploit generation with WinDBG☆190Updated 8 years ago
- Smart DLL execution for malware analysis in sandbox systems☆143Updated 10 years ago
- ROPMEMU is a framework to analyze, dissect and decompile complex code-reuse attacks.☆284Updated 8 years ago
- Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques …☆281Updated 7 years ago
- CTF Writeups☆186Updated 7 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- Cminer is a tool for enumerating the code caves in PE files.☆148Updated last year
- x86 emulation and shellcode detection☆151Updated last year
- Attacking the Core associated source files☆87Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆313Updated 7 years ago
- Hardcore corruption of my execve() vulnerability in WSL☆214Updated 7 years ago
- Pocs for Antivirus Software‘s Kernel Vulnerabilities☆263Updated 7 years ago
- Personal repository for all ctf related stuffs☆67Updated 4 months ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆97Updated 8 years ago
- Generating YARA rules based on binary code☆207Updated 3 years ago
- Tool to make in memory man in the middle☆124Updated 6 years ago
- 🏴 Collection of CTF solutions☆75Updated 5 years ago