adwait1-g / Practical-Malware-AnalysisLinks
This repository has everything I have learnt so far while reading the book Practical Malware Analysis
☆32Updated 5 years ago
Alternatives and similar repositories for Practical-Malware-Analysis
Users that are interested in Practical-Malware-Analysis are comparing it to the libraries listed below
Sorting:
- Code snippets for Qiling Tutorials☆21Updated 5 years ago
- CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨�…☆31Updated 2 years ago
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 3 years ago
- Linux Rootkits (4.x Kernel)☆85Updated 4 years ago
- Linux kernel internals' notes☆20Updated last year
- Rootkit Development tutorial series. Works on Kernel version 4.15 Can be adapted for 5.3+☆44Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆71Updated 5 years ago
- Learn the fundamentals of Binary Auditing. Know how HLL mapping works, get more inner file understanding than ever.☆81Updated 4 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆79Updated 8 years ago
- ☆90Updated 4 years ago
- Automatically exported from code.google.com/p/narly☆24Updated 4 years ago
- My CTF writeups☆27Updated 4 years ago
- Script(s) to assist with the setup of WinDBG & mona.py on a Windows 10 VM☆28Updated 2 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆12Updated 4 years ago
- ☆51Updated 2 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- Rootkit spotter - experimental Linux rootkit finder LKM☆30Updated 4 years ago
- Proof of concept for injecting simple shellcode via ptrace into a running process.☆73Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆55Updated 3 years ago
- ☆37Updated 6 months ago
- This repo contains all the code that will be referred at https://scriptdotsh.com by Paranoid Ninja☆46Updated 5 years ago
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆88Updated last year
- SLAE x86 from Pentester Academy☆15Updated 5 years ago
- A collection of my reverse engineering and malware analysis write-ups☆20Updated 4 years ago
- ☆28Updated 4 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- ☆20Updated 3 years ago
- Some basic challenges and a walkthrough guide to get people into reversing and patching using free tools☆59Updated 5 years ago
- SSD Challenges☆47Updated 2 years ago