Exercise writeups from the book Practical Malware Analysis.
☆246Aug 9, 2023Updated 2 years ago
Alternatives and similar repositories for practical-malware-analysis
Users that are interested in practical-malware-analysis are comparing it to the libraries listed below
Sorting:
- Binaries for the book Practical Malware Analysis☆1,453Jun 14, 2022Updated 3 years ago
- Materials for Windows Malware Analysis training (volume 1)☆2,028Jul 1, 2024Updated last year
- ☆32Jun 10, 2020Updated 5 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- ☆29Sep 27, 2020Updated 5 years ago
- APT Malware Dataset Containing over 3,500 State-Sponsored Malware Samples☆361Nov 10, 2022Updated 3 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- ☆80Jul 30, 2020Updated 5 years ago
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- ☆98Oct 7, 2020Updated 5 years ago
- A curated list of awesome malware analysis tools and resources☆45Jul 17, 2020Updated 5 years ago
- Collection of scripts used to analyse malware or emails☆20Oct 6, 2020Updated 5 years ago
- A Netcat-style backdoor for pentesting and pentest exercises☆51Nov 19, 2020Updated 5 years ago
- Seed Corpus for clamav-devel oss-fuzz integration.☆34Jul 30, 2019Updated 6 years ago
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆47Aug 30, 2017Updated 8 years ago
- IoT Malware Similarity Analysis Platform☆45Jan 30, 2022Updated 4 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆903Feb 25, 2020Updated 6 years ago
- ☆111Dec 27, 2019Updated 6 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Jan 5, 2021Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Jun 23, 2016Updated 9 years ago
- a State-Machine reversing exercise☆13Apr 22, 2021Updated 4 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- Analyse MSI files for vulnerabilities☆142Aug 30, 2024Updated last year
- A Python3 module to assist in fuzzing web applications☆57Jan 11, 2024Updated 2 years ago
- Advanced Portable Executable File Analyzer And Disassembler 32 & 64 Bit☆100Apr 15, 2019Updated 6 years ago
- Sandfly Linux Stealth Rootkit Decloaking Utility☆108Jan 19, 2023Updated 3 years ago
- Windows Events Attack Samples☆2,515Jan 24, 2023Updated 3 years ago
- Network Forensic & Anomaly Detection System; tailored for covert channel/network steganography detection☆28May 13, 2024Updated last year
- Symbolic debugging tool using JonathanSalwan/Triton☆25Oct 24, 2018Updated 7 years ago
- My manual analysis of malware families☆13Jul 12, 2017Updated 8 years ago
- ghidra scripts☆15Feb 5, 2021Updated 5 years ago
- H2HC 2019 Slides/Materials/Presentations☆56Dec 17, 2019Updated 6 years ago
- Resources for Windows exploit development☆1,649Dec 20, 2021Updated 4 years ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,547Jan 20, 2026Updated last month
- Some of my publicly available Malware analysis and Reverse engineering.☆936Jun 3, 2024Updated last year
- APT-Hunter is Threat Hunting tool for windows event logs which made by purple team mindset to provide detect APT movements hidden in the …☆1,402Nov 7, 2024Updated last year