OpenRCE / Malware-Analysis-Training
Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.
☆893Updated 5 years ago
Alternatives and similar repositories for Malware-Analysis-Training:
Users that are interested in Malware-Analysis-Training are comparing it to the libraries listed below
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,114Updated 4 years ago
- Materials for Windows Malware Analysis training (volume 1)☆1,973Updated 9 months ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆774Updated 5 months ago
- List of Awesome Advanced Windows Exploitation References☆1,477Updated 3 years ago
- Awesome Forensics Resources. Almost 300 open source forensics tools, and 600 blog posts about forensics.☆631Updated 5 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,181Updated 4 years ago
- Resources for Windows exploit development☆1,566Updated 3 years ago
- A Course on Intermediate Level Linux Exploitation☆998Updated 4 years ago
- Linux Binary Exploitation☆1,323Updated 3 years ago
- Windows kernel and user mode emulation.☆1,627Updated this week
- An archive of low-level CTF challenges developed over the years☆625Updated 3 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆805Updated 2 years ago
- Slides and challenges for my binary exploitation workshop at BlackHoodie 2018.☆341Updated 6 years ago
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆906Updated last year
- A machine learning tool that ranks strings based on their relevance for malware analysis.☆705Updated 8 months ago
- Malware samples, analysis exercises and other interesting resources.☆1,536Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆706Updated 2 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2☆718Updated 4 years ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,287Updated last month
- A collection of links related to VMware escape exploits☆1,411Updated 6 months ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,962Updated 2 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆621Updated 4 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,142Updated 2 months ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,610Updated last month
- Security Research from the Microsoft Security Response Center (MSRC)☆1,346Updated 7 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,263Updated this week
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,134Updated this week
- Scripts for the Ghidra software reverse engineering suite.☆1,064Updated 4 years ago
- Python module for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5. Can also be used with IDA Pro and Rekall …☆1,323Updated 2 years ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,710Updated 4 years ago