aN0mad / analysisToolsLinks
Malware analysis tools used alongside "Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software" Book by Andrew Honig and Michael Sikorski
☆54Updated 7 years ago
Alternatives and similar repositories for analysisTools
Users that are interested in analysisTools are comparing it to the libraries listed below
Sorting:
- Exercise writeups from the book Practical Malware Analysis.☆236Updated 2 years ago
 - Setup scripts for my Malware Analysis VMs☆257Updated 3 years ago
 - Malware Samples that could be used for teaching students about malware analysis.☆61Updated last year
 - MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆220Updated 2 years ago
 - Source code of exploiting windows API for red teaming series☆150Updated 3 years ago
 - An Xdbg Plugin of the ERC Library.☆183Updated 6 months ago
 - The source code files that accompany the short book "Building C2 Implants in C++: A Primer" by Steven Patterson (@shogun_lab).☆232Updated 10 months ago
 - Just another collection of links, tools, reports and other stuff☆25Updated 4 years ago
 - ☆302Updated 4 years ago
 - Conti Locker source code☆196Updated 3 years ago
 - All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆42Updated 8 years ago
 - Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated 4 months ago
 - Batch script to compile a binary shellcode blob into an exe file☆87Updated 6 years ago
 - Virus Exchange (VX) - Collection of malware or assembly code used for "offensive" purposed.☆189Updated 3 months ago
 - Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆198Updated last month
 - PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆216Updated last year
 - A basic c2 / agent.☆119Updated 5 years ago
 - Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆182Updated last month
 - Evasions encyclopedia gathers methods used by malware to evade detection when run in virtualized environment. Methods are grouped into ca…☆433Updated last year
 - Code snips and notes☆137Updated 3 years ago
 - Malware Analysis Tools☆30Updated 6 years ago
 - Chocolatey packages supporting the analysis environment projects FLARE-VM & Commando VM.☆204Updated this week
 - Nuevo Curso Completo de Exploiting con IDA Pro pro Ricardo Narvaja☆107Updated 7 years ago
 - Files for the packer tutorial☆73Updated 4 years ago
 - TartarusGate, Bypassing EDRs☆621Updated 3 years ago
 - Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆217Updated 3 years ago
 - Emulate and Dissect MSF and *other* attacks☆144Updated last year
 - ☆76Updated 8 years ago
 - Resources for learning malware analysis and reverse engineering☆135Updated last year
 - SHAREM is a shellcode analysis framework, capable of emulating more than 20,000 WinAPIs and virutally all Windows syscalls. It also conta…☆467Updated 4 months ago