aN0mad / analysisToolsLinks
Malware analysis tools used alongside "Practical Malware Analysis: The Hands-on Guide to Dissecting Malicious Software" Book by Andrew Honig and Michael Sikorski
☆57Updated 7 years ago
Alternatives and similar repositories for analysisTools
Users that are interested in analysisTools are comparing it to the libraries listed below
Sorting:
- MSI Dump - a tool that analyzes malicious MSI installation packages, extracts files, streams, binary data and incorporates YARA scanner.☆225Updated 2 years ago
- Setup scripts for my Malware Analysis VMs☆259Updated 3 years ago
- PowerDecode is a PowerShell-based tool that allows to deobfuscate PowerShell scripts obfuscated across multiple layers. The tool performs…☆228Updated last year
- Unprotect is a collaborative platform dedicated to uncovering and documenting malware evasion techniques. We invite you to join us in thi…☆201Updated 4 months ago
- Advanced static analysis tool☆106Updated 3 weeks ago
- Graphical interface for PortEx, a Portable Executable and Malware Analysis Library☆143Updated 7 months ago
- Exercise writeups from the book Practical Malware Analysis.☆243Updated 2 years ago
- Malware Samples that could be used for teaching students about malware analysis.☆63Updated last year
- My Malware Analysis Reports☆25Updated 3 years ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆91Updated last month
- Embed an executable as a PE resource, drops and launches it in runtime.☆64Updated 4 years ago
- ☆76Updated 2 years ago
- A small program written in C that is designed to load 32/64-bit shellcode and allow for execution or debugging. Can also output PE files …☆167Updated last year
- Conti Locker source code☆197Updated 3 years ago
- A ProcessMonitor visualization application written in rust.☆184Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆143Updated last year
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 7 months ago
- Source code of exploiting windows API for red teaming series☆150Updated 3 years ago
- Vulnerable driver research tool, result and exploit PoCs☆227Updated 2 years ago
- A basic c2 / agent.☆118Updated 5 years ago
- Malware Sandboxes & Malware Source☆108Updated 8 years ago
- Lnk Explorer Command line edition!!☆334Updated last year
- ☆306Updated 4 years ago
- Full source of the Conti Ransomware Including the missing Locker files from the original leak. I have fixed some of the errors intentiona…☆166Updated 2 years ago
- An Xdbg Plugin of the ERC Library.☆185Updated 9 months ago
- Windows Shortcut file (LNK) parser☆117Updated 2 months ago
- Dump quarantined files from Windows Defender☆73Updated 3 years ago
- Extract C2 Traffic☆252Updated last year
- Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows☆221Updated 3 years ago
- Batch script to compile a binary shellcode blob into an exe file☆89Updated 6 years ago