This repository has everything I have learnt so far while reading the book Practical Malware Analysis
☆35Nov 4, 2019Updated 6 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- KumuluzEE REST extension for implementation of common, advanced and flexible REST API functionalities and patterns as microservices.☆10Jan 12, 2026Updated 2 months ago
- Simple virtual machine for teaching basic concepts of virtual machine implementation.☆29Oct 29, 2019Updated 6 years ago
- ☆21Dec 15, 2023Updated 2 years ago
- Network monitor for Linux☆13Aug 11, 2019Updated 6 years ago
- x64dbg scripts for finding OEP of packers☆15Oct 22, 2018Updated 7 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Flexible, high performance IMDB & disk hybrid database written in Go. Features a brand-new modernistic query language and deep schema va…☆13Apr 21, 2024Updated last year
- A working version of this tutorial: https://docs.microsoft.com/en-us/windows/desktop/rpc/tutorial☆16Jun 22, 2019Updated 6 years ago
- Exploitation on different architectures (x86, x64, arm, mips, avr)☆38Oct 23, 2018Updated 7 years ago
- My solutions for pwn and reversing challenges☆11Mar 18, 2018Updated 8 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- (Inverse Path | F-Secure) Hardware Security Team - Security Advisories☆24Dec 15, 2021Updated 4 years ago
- NextB的基于敏感哈希的恶意文件相似度比较工具(C发行版本)☆20Nov 20, 2019Updated 6 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- ROPChain generator.☆40Sep 20, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 12, 2026Updated last week
- Source Code of MSIL Ransom☆14Feb 11, 2023Updated 3 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- ☆38Apr 1, 2024Updated last year
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- If you're trying to get out there and contribute to some open source projects but feel a bit intimidated about getting your very first PR…☆24Nov 27, 2017Updated 8 years ago
- [WIP] a simple UI for Vulhub☆16Jun 10, 2021Updated 4 years ago
- files for (μ)scope projects☆11Jul 8, 2019Updated 6 years ago
- A tool to extract the DEX file from ODEX compiled ahead of time version.☆11Sep 28, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Java bindings for Google cpu_features☆10Jun 20, 2024Updated last year
- ☆13Oct 10, 2018Updated 7 years ago
- ☆15Jan 20, 2016Updated 10 years ago
- ☆11Oct 17, 2024Updated last year
- A simple tool for bulk adding/updating/removing tags from AWS resources.☆13Jan 8, 2016Updated 10 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- A Clojure library designed to compress/decompress data.☆13Feb 4, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- A Python command line argument to object parsing library for command line application development☆14Mar 23, 2016Updated 10 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- Sources Codes of many Office Malwares☆17Sep 4, 2022Updated 3 years ago
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Links or additional data to some researches☆14May 24, 2019Updated 6 years ago
- Triton based symbolic emulator☆16Oct 30, 2022Updated 3 years ago