ckane / CS7038-Malware-Analysis
Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)
☆770Updated 4 months ago
Alternatives and similar repositories for CS7038-Malware-Analysis:
Users that are interested in CS7038-Malware-Analysis are comparing it to the libraries listed below
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆893Updated 5 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆804Updated 2 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,109Updated 4 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,518Updated last year
- My curated list of awesome links, resources and tools on infosec related topics☆1,091Updated 3 weeks ago
- Reverse Engineering Resources☆225Updated 6 years ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,696Updated 3 years ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆628Updated 7 months ago
- Materials for Windows Malware Analysis training (volume 1)☆1,965Updated 8 months ago
- A Course on Intermediate Level Linux Exploitation☆996Updated 4 years ago
- 🦄 A curated list of the awesome resources about the Vulnerability Research☆1,171Updated 4 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,944Updated 2 years ago
- Binaries for the book Practical Malware Analysis☆1,225Updated 2 years ago
- Collection of resources that are made by the Malware Research community☆222Updated last year
- A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net☆897Updated 11 months ago
- MBC content in markdown☆408Updated last month
- List of Awesome Advanced Windows Exploitation References☆1,473Updated 3 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,101Updated last month
- ☆1,385Updated 3 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆794Updated 9 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆4,043Updated 7 months ago
- A curated list of awesome YARA rules, tools, and people.☆3,693Updated 2 weeks ago
- Vulnerable server used for learning software exploitation☆1,021Updated 4 years ago
- Everything related to Linux Forensics☆694Updated last year
- High Octane Triage Analysis☆710Updated this week
- An example C program which contains vulnerable code for common types of vulnerabilities. It can be used to show fuzzing concepts.☆685Updated 4 months ago
- Analysis of malware and Cyber Threat Intel of APT and cybercriminals groups☆707Updated 2 years ago
- A sorted and updated list of security wargame sites.☆962Updated 2 weeks ago
- A collection of sources of indicators of compromise.☆838Updated 4 months ago
- Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read☆1,271Updated last week