SafeEval / practical-malware-analysisLinks
Exercise writeups from the book Practical Malware Analysis.
☆227Updated last year
Alternatives and similar repositories for practical-malware-analysis
Users that are interested in practical-malware-analysis are comparing it to the libraries listed below
Sorting:
- Setup scripts for my Malware Analysis VMs☆253Updated 3 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆118Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- ☆307Updated 3 years ago
- 0xpat blog☆100Updated 3 years ago
- This repository aims to compile all Flare-On challenge binaries and write-ups. Update: 2014 -2024.☆325Updated 3 months ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆740Updated 3 years ago
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- MBC content in markdown☆457Updated 2 weeks ago
- ☆192Updated 7 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆148Updated 5 years ago
- Collection of resources for my preparation to take the OSEE certification.☆279Updated 4 years ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆249Updated 2 years ago
- ☆186Updated last year
- ☆204Updated this week
- Code snips and notes☆136Updated 3 years ago
- ☆754Updated last year
- Malware development for red teaming workshop☆220Updated 3 years ago
- Run several volatility plugins at the same time☆114Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 2 weeks ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆581Updated last year
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Some of my publicly available Malware analysis and Reverse engineering.☆814Updated last year
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆708Updated 2 years ago
- Distributed malware processing framework based on Python, Redis and S3.☆430Updated 2 weeks ago
- The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆229Updated 6 months ago
- Find patterns of vulnerabilities on Windows in order to find 0-day and write exploits of 1-days. We use Microsoft security updates in ord…☆186Updated 3 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆56Updated last year
- Quickly debug shellcode extracted during malware analysis☆604Updated 2 years ago
- Malware Sandboxes & Malware Source☆95Updated 8 years ago