Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
☆19Jan 4, 2019Updated 7 years ago
Alternatives and similar repositories for Practical_Malware_Analysis
Users that are interested in Practical_Malware_Analysis are comparing it to the libraries listed below
Sorting:
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Rust Python modules for interacting with Metaplex's NFT standard.☆12Feb 26, 2022Updated 4 years ago
- Converts Sigma, Yara rules and IOCs☆18Jan 26, 2025Updated last year
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- network security named entity recognition, Chinese☆11Aug 27, 2019Updated 6 years ago
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Tiny, cheap, simple, accurate, self powered resistive SWR and power meter for SOTA and back packers☆22Jun 25, 2020Updated 5 years ago
- ☆25Jul 12, 2023Updated 2 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- ☆25Apr 30, 2012Updated 13 years ago
- Code and exploit for the "read-eval-pwn loop" challenge of 33C3 CTF☆36Dec 31, 2016Updated 9 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- ASProtect reverse engineering & analysis WinDbg extension☆24Nov 16, 2020Updated 5 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- source&exe☆38Jul 18, 2017Updated 8 years ago
- Data Structures and Algorithms. Contribute and Learn together.☆11Oct 11, 2022Updated 3 years ago
- Malware Analysis tools☆26Sep 14, 2024Updated last year
- Tools to reverse the Toshiba FlashAir SD cards☆28Jul 23, 2019Updated 6 years ago
- anything I find interesting regarding reverse engineering☆13May 7, 2017Updated 8 years ago
- Passive Network Audit Framework☆32May 17, 2018Updated 7 years ago
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Dec 24, 2020Updated 5 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 4 months ago
- BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a …☆32May 22, 2023Updated 2 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- My personal tech blog☆16Dec 13, 2024Updated last year
- Intercepts HTTP calls and allows fake implementations to take over entire domains. Used for testing.☆13Oct 20, 2015Updated 10 years ago
- Educational computer simulator on a mission to "superscale" the study of computer architecture fundamentals☆13Mar 13, 2026Updated last week
- fG!'s crackme #1 source code☆36Jun 11, 2013Updated 12 years ago
- Tools built using Dyninst or Dyninst component libraries.☆26Mar 15, 2023Updated 3 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Experiments with Linux kernel modules☆12Feb 5, 2022Updated 4 years ago
- ☆40Mar 17, 2018Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago