Materials for a course based on the Practical Malware Analysis text by Andrew Honig and Michael Sikorski
☆19Jan 4, 2019Updated 7 years ago
Alternatives and similar repositories for Practical_Malware_Analysis
Users that are interested in Practical_Malware_Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Plugins for the Viper Framework☆14Sep 21, 2019Updated 6 years ago
- Scripts targeting specific families☆13Jul 3, 2017Updated 8 years ago
- Converts Sigma, Yara rules and IOCs☆17Jan 26, 2025Updated last year
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 4 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A Docker container for Moloch based on minimal Debian☆13Jun 23, 2017Updated 8 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Tiny, cheap, simple, accurate, self powered resistive SWR and power meter for SOTA and back packers☆22Jun 25, 2020Updated 5 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- ssdeep cluster analysis for malware files☆31Jun 5, 2020Updated 5 years ago
- Decrypt NTDS hashes☆23Jan 22, 2014Updated 12 years ago
- a collection of yara rules for binary analysis☆24Aug 24, 2017Updated 8 years ago
- Tools to reverse the Toshiba FlashAir SD cards☆29Jul 23, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- anything I find interesting regarding reverse engineering☆12May 7, 2017Updated 9 years ago
- Docker Implementation of Hamclock☆24Jan 3, 2025Updated last year
- Malware Analysis, Threat Intelligence and Reverse Engineering: LABS☆82Dec 24, 2020Updated 5 years ago
- Training materials I've written.☆11Nov 11, 2025Updated 6 months ago
- BLACKPHENIX is an open source malware analysis automation framework composed of services, scripts, plug-ins, and tools and is based on a …☆32May 22, 2023Updated 2 years ago
- A Z-match Tuner for QRP☆34Jul 9, 2023Updated 2 years ago
- Additional material for the malware variants identification paper☆10Sep 6, 2019Updated 6 years ago
- A repo to document API functions mapped to security events across diverse platforms☆74Nov 1, 2019Updated 6 years ago
- a bunch of malware in all platform, some maybe not work, this code for some study case or for knowledge. for information about malware yo…☆14Jan 29, 2021Updated 5 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- My personal tech blog☆17Dec 13, 2024Updated last year
- Intercepts HTTP calls and allows fake implementations to take over entire domains. Used for testing.☆13Oct 20, 2015Updated 10 years ago
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- Educational computer simulator on a mission to "superscale" the study of computer architecture fundamentals☆13May 12, 2026Updated last week
- study the kernel data structures and its API☆14May 10, 2022Updated 4 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 13 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 7 years ago
- Experiments with Linux kernel modules☆12Apr 20, 2026Updated last month
- RunPE dump - I wrote this to have better control over the analysis of malwares. I can stop and analysis malware when it uses some of the …☆10Jul 1, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Easy way to automate the complex task☆15Jul 15, 2022Updated 3 years ago
- ⚠️ Collection of malicious file ⚠️☆13May 5, 2021Updated 5 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- A pcb for end fed antennas (EFHW, random wire) for SOTA, POTA,... xOTA☆41Nov 16, 2023Updated 2 years ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 3 years ago