MalwareTech / Beginner-Reversing-ChallengesLinks
https://www.malwaretech.com/beginner-malware-reversing-challenges
☆63Updated 5 years ago
Alternatives and similar repositories for Beginner-Reversing-Challenges
Users that are interested in Beginner-Reversing-Challenges are comparing it to the libraries listed below
Sorting:
- Code snips and notes☆137Updated 3 years ago
- A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck☆128Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆57Updated last year
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆148Updated 5 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆79Updated 2 years ago
- repository of tools & resources of the MMD team☆131Updated 2 years ago
- 0xpat blog☆100Updated 3 years ago
- Resources for learning malware analysis and reverse engineering☆106Updated last year
- Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆183Updated 3 years ago
- Personal research and publication on malware families☆139Updated 6 months ago
- Unprotect is a python tool for parsing PE malware and extract evasion techniques.☆116Updated 2 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆179Updated last week
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆119Updated 2 years ago
- A golang CLI tool to download malware from a variety of sources.☆148Updated last week
- API Logger for Windows Executables☆78Updated 4 years ago
- Capa analysis importer for Ghidra.☆61Updated 4 years ago
- ☆106Updated last year
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆28Updated 5 years ago
- Malware Configuration Extraction Modules☆50Updated last year
- ☆51Updated 2 years ago
- x64 Windows Exploit Development☆111Updated 10 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆145Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆419Updated last year
- Research notes☆126Updated 7 months ago
- Userland API monitor for threat hunting☆58Updated 5 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Malduck is your ducky companion in malware analysis journeys☆339Updated 3 weeks ago
- runsc loads 32/64 bit shellcode (depending on how runsc is compiled) in a way that makes it easy to load in a debugger. This code is base…☆36Updated 2 years ago
- Malware similarity platform with modularity in mind.☆78Updated 3 years ago