RPISEC / MalwareLinks
Course materials for Malware Analysis by RPISEC
☆3,868Updated 2 years ago
Alternatives and similar repositories for Malware
Users that are interested in Malware are comparing it to the libraries listed below
Sorting:
- Course materials for Modern Binary Exploitation by RPISEC☆5,702Updated 3 years ago
- Defund the Police.☆12,648Updated last year
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,558Updated this week
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,987Updated 3 years ago
- ☆18Updated 2 years ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,753Updated last year
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,527Updated last year
- An advanced memory forensics framework☆7,713Updated 3 weeks ago
- FakeNet-NG - Next Generation Dynamic Network Analysis Tool☆1,928Updated 2 months ago
- A curated list of awesome reversing resources☆4,274Updated last year
- A curated list of awesome YARA rules, tools, and people.☆3,827Updated 2 months ago
- A repository for learning various heap exploitation techniques.☆7,719Updated 2 weeks ago
- A collected list of awesome security talks☆4,113Updated 4 years ago
- A collection of malware samples caught by several honeypots i manage☆1,700Updated 3 years ago
- Great security list for fun and profit☆1,802Updated 2 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,206Updated 4 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,344Updated 3 weeks ago
- A collection of resources for linux reverse engineering☆2,041Updated 3 years ago
- A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open…☆11,917Updated last year
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,682Updated 3 months ago
- This tool lets you search your gadgets on your binaries to facilitate your ROP exploitation. ROPgadget supports ELF, PE and Mach-O format…☆4,150Updated last week
- Binaries for the book Practical Malware Analysis☆1,287Updated 2 years ago
- CTF framework and exploit development library☆12,646Updated last week
- PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with othe…☆3,599Updated last year
- A Course on Intermediate Level Linux Exploitation☆1,003Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆8,852Updated 3 weeks ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10,436Updated 10 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆5,706Updated 3 years ago
- A list of Reverse Engineering articles, books, and papers☆2,494Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,560Updated last year