Malware-Research / Resources
Collection of resources that are made by the Malware Research community
☆225Updated last year
Alternatives and similar repositories for Resources:
Users that are interested in Resources are comparing it to the libraries listed below
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆634Updated 9 months ago
- Different learning materials☆225Updated last month
- ☆435Updated 2 years ago
- Jupyter Notebooks for the Blue Team☆145Updated last month
- This repository contains indicators of compromise (IOCs) of our various investigations.☆248Updated last week
- A curated list of awesome Memory Forensics for DFIR☆429Updated 2 months ago
- Just some lists of Malware Configs☆169Updated 3 months ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Containing my notes, practice binaries + solutions, blog posts, etc. for the Offensive Security Exploit Developer (OSED/EXP-301)☆647Updated 8 months ago
- Code snips and notes☆137Updated 3 years ago
- Research notes☆123Updated 4 months ago
- ☆515Updated 6 months ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆558Updated last year
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆194Updated 2 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated last year
- ☆357Updated this week
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year
- ☆157Updated last year
- Gets updates from various clearnet domains and ransomware threat actor domains☆388Updated last year
- ☆183Updated last year
- Malware development for red teaming workshop☆219Updated 3 years ago
- ☆136Updated 2 years ago
- The best resources for learning exploit development☆113Updated 5 years ago
- Contains all the material from the DEF CON 31 workshop "(In)direct Syscalls: A Journey from High to Low".☆656Updated last year
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆360Updated 2 years ago
- A repository of credential stealer formats☆210Updated 3 weeks ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆541Updated 9 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!