Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
☆19Jan 4, 2019Updated 7 years ago
Alternatives and similar repositories for Practical_Malware_Analysis
Users that are interested in Practical_Malware_Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆15Sep 9, 2012Updated 13 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 3 months ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆23Nov 16, 2020Updated 5 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- source&exe☆39Jul 18, 2017Updated 8 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- anything I find interesting regarding reverse engineering☆12May 7, 2017Updated 8 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Dec 24, 2020Updated 5 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 5 months ago
- A repo to document API functions mapped to security events across diverse platforms☆74Nov 1, 2019Updated 6 years ago
- My personal tech blog☆17Dec 13, 2024Updated last year
- Intercepts HTTP calls and allows fake implementations to take over entire domains. Used for testing.☆13Oct 20, 2015Updated 10 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- Educational computer simulator on a mission to "superscale" the study of computer architecture fundamentals☆13Apr 23, 2026Updated last week
- fG!'s crackme #1 source code☆36Jun 11, 2013Updated 12 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- study the kernel data structures and its API☆14May 10, 2022Updated 3 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Experiments with Linux kernel modules☆12Apr 20, 2026Updated last week
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 4 years ago
- Reverse engineering games using SkoolKit☆14Mar 24, 2026Updated last month
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Grouper Python Client Library☆10Apr 18, 2023Updated 3 years ago
- ☆18Jun 3, 2017Updated 8 years ago
- Web for Pentester I☆12Sep 21, 2018Updated 7 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- Viewstate Hidden Control Enumerator☆17Sep 12, 2013Updated 12 years ago
- Reverse Engineering and Malware Analysis - Books, Tools, Courses, etc.☆44Apr 5, 2017Updated 9 years ago
- This repository contains all the solutions of assignments, starter files and other materials related to this specialization.☆10Jan 31, 2021Updated 5 years ago