SafeEval / practical-malware-analysis
Exercise writeups from the book Practical Malware Analysis.
☆192Updated last year
Related projects: ⓘ
- Setup scripts for my Malware Analysis VMs☆243Updated 2 years ago
- Collection of resources for my preparation to take the OSEE certification.☆214Updated 4 years ago
- ☆183Updated 2 weeks ago
- ☆293Updated 2 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆111Updated 2 years ago
- Anti-virus artifacts. Listing APIs hooked by: Avira, BitDefender, F-Secure, MalwareBytes, Norton, TrendMicro, and WebRoot.☆722Updated 2 years ago
- Collection of Windows usermode exploits targeting various third-party software applications, these exploits were written in preparation f…☆135Updated 3 years ago
- Course content and slides from my ancient training on Reverse Engineering & Malware Analysis☆139Updated 4 years ago
- OSEE Preparation☆166Updated 5 years ago
- MBC content in markdown☆359Updated this week
- 0xpat blog☆94Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆217Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆110Updated last year
- ☆173Updated 6 years ago
- Extract and Deobfuscate XLM macros (a.k.a Excel 4.0 Macros)☆568Updated 4 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆697Updated last year
- collect for learning cases☆563Updated 3 months ago
- ☆86Updated this week
- Malware development for red teaming workshop☆210Updated 2 years ago
- Code snips and notes☆129Updated 2 years ago
- Detect and respond to Cobalt Strike beacons using ETW.☆478Updated 2 years ago
- bespoke tooling for offensive security's Windows Usermode Exploit Dev course (OSED)☆491Updated 2 months ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆68Updated 7 years ago
- ☆67Updated this week
- ☆175Updated 7 months ago
- Arya is a unique tool that produces pseudo-malicious files meant to trigger YARA rules. You can think of it like a reverse YARA.☆238Updated last year
- ☆718Updated 11 months ago
- Personal research and publication on malware families☆136Updated 2 years ago
- Run several volatility plugins at the same time☆107Updated last year
- Exploit Development, backdooring PE, bypassing Anti-Virus (AV), assembly shellcoding☆137Updated 2 years ago