In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Simple malware sample are given to make the analysis more realistic.
☆12May 25, 2016Updated 9 years ago
Alternatives and similar repositories for training-basic-malware-analysis
Users that are interested in training-basic-malware-analysis are comparing it to the libraries listed below
Sorting:
- 恶意代码分析学习笔记☆10Dec 29, 2015Updated 10 years ago
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- Repository containing malware analysis filters for the Windows SysInternals' - Process Monitor tool☆20Oct 2, 2020Updated 5 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Advanced Malware Analysis [video], published by Packt☆22Jan 24, 2023Updated 3 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- ExeScan is the FREE console based tool to detect anomalies in PE (Portable Executable) files. It quickly scans given executable file and …☆21Dec 14, 2018Updated 7 years ago
- Scripts, Yara rules and other files developed during malware investigations☆27Aug 19, 2022Updated 3 years ago
- Design documents related to the decompilation pipeline.☆30Aug 25, 2025Updated 6 months ago
- Windows builds for use with angr framework☆29Feb 12, 2016Updated 10 years ago
- Iptv tv películas cine series streaming multimedia☆11Feb 3, 2026Updated 3 weeks ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- KitsuneC2 is a cross-platform adversary emulation tool written in Go.☆12Oct 25, 2024Updated last year
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- un sensor pour récupérer les informations des prochaines marées☆12Jan 27, 2026Updated last month
- Offline amnesic live Linux distribution☆14Mar 8, 2025Updated 11 months ago
- Volatility, on Docker 🐳☆41Nov 20, 2025Updated 3 months ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Library for extracting fields from Sigtran TCAP/INAP messages☆11Feb 17, 2026Updated last week
- Open Source Digital Signage Platform☆14Updated this week
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Tools for parsing Forensic images☆41Dec 14, 2018Updated 7 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- Lista iptv 2024☆11Jun 30, 2025Updated 8 months ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- ☆12May 30, 2019Updated 6 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- OrientDB Module for Play! framework☆24Aug 4, 2013Updated 12 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- HOL Guidebook☆12Oct 11, 2024Updated last year
- ☆42Jul 3, 2022Updated 3 years ago
- ☆10Aug 9, 2024Updated last year
- ☆42Sep 16, 2022Updated 3 years ago
- A powerful prompt template engine built upon Jinja☆12Oct 22, 2025Updated 4 months ago