SafeEval / practical-malware-analysisLinks
Exercise writeups from the book Practical Malware Analysis.
☆243Updated 2 years ago
Alternatives and similar repositories for practical-malware-analysis
Users that are interested in practical-malware-analysis are comparing it to the libraries listed below
Sorting:
- Setup scripts for my Malware Analysis VMs☆258Updated 3 years ago
- ☆212Updated last month
- ☆317Updated 3 years ago
- Collection of resources that are made by the Malware Research community☆235Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆120Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆124Updated 2 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆152Updated 6 years ago
- ☆199Updated 8 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆751Updated 4 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆436Updated last year
- 0xpat blog☆109Updated 4 years ago
- Collection of resources for my preparation to take the OSEE certification.☆303Updated 5 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆587Updated last year
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆373Updated 9 months ago
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆45Updated 8 years ago
- esoteric☆56Updated 5 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆259Updated 3 years ago
- The best resources for learning exploit development☆122Updated 6 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆185Updated 3 months ago
- Resources for learning malware analysis and reverse engineering☆143Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆146Updated 4 years ago
- Quickly debug shellcode extracted during malware analysis☆623Updated 2 years ago
- Emulate and Dissect MSF and *other* attacks☆142Updated last year
- Some of my publicly available Malware analysis and Reverse engineering.☆926Updated last year
- Code snips and notes☆140Updated 3 years ago
- Run several volatility plugins at the same time☆117Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 7 months ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- An Xdbg Plugin of the ERC Library.☆184Updated 8 months ago