SafeEval / practical-malware-analysis
Exercise writeups from the book Practical Malware Analysis.
☆202Updated last year
Alternatives and similar repositories for practical-malware-analysis:
Users that are interested in practical-malware-analysis are comparing it to the libraries listed below
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated last year
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆144Updated 5 years ago
- ☆301Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆115Updated 2 years ago
- ☆198Updated 5 months ago
- Collection of resources that are made by the Malware Research community☆223Updated last year
- ☆186Updated 7 years ago
- MBC content in markdown☆421Updated 2 months ago
- Collection of resources for my preparation to take the OSEE certification.☆272Updated 4 years ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆101Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆736Updated 3 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆177Updated 2 months ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆577Updated 10 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆245Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- This repo is aim to compile all Flare-On challenge's binaries. Update: 2014 -2022.☆309Updated 2 years ago
- 0xpat blog☆101Updated 3 years ago
- Code snips and notes☆135Updated 3 years ago
- Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆397Updated 8 months ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆180Updated 3 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆803Updated 9 months ago
- Research notes☆121Updated 3 months ago
- OSEE Preparation☆175Updated 6 years ago
- A repository that maps commonly used attacks using MSRPC protocols to ATT&CK☆322Updated last year
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated 11 months ago
- Personal research and publication on malware families☆137Updated 2 months ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆142Updated 3 years ago
- collect for learning cases☆580Updated 9 months ago