SafeEval / practical-malware-analysis
Exercise writeups from the book Practical Malware Analysis.
☆225Updated last year
Alternatives and similar repositories for practical-malware-analysis
Users that are interested in practical-malware-analysis are comparing it to the libraries listed below
Sorting:
- Setup scripts for my Malware Analysis VMs☆252Updated 3 years ago
- Collection of resources that are made by the Malware Research community☆225Updated last year
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆737Updated 3 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆148Updated 5 years ago
- ☆305Updated 3 years ago
- ☆200Updated last week
- MBC content in markdown☆444Updated last month
- Collection of resources for my preparation to take the OSEE certification.☆274Updated 4 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆578Updated last year
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆143Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- ☆193Updated 7 years ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆319Updated last month
- 0xpat blog☆100Updated 3 years ago
- Code snips and notes☆137Updated 3 years ago
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆705Updated 2 years ago
- Malware development for red teaming workshop☆219Updated 3 years ago
- The best resources for learning exploit development☆114Updated 5 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆102Updated 2 years ago
- Research notes☆124Updated 5 months ago
- collect for learning cases☆584Updated 11 months ago
- OSEE Preparation☆178Updated 6 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆176Updated 3 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆247Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- ☆750Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- Beta versions of my software☆253Updated 2 weeks ago