Malware Analysis Fundamentals, by EC-Council
☆25Jul 25, 2021Updated 4 years ago
Alternatives and similar repositories for Malware-Analysis-Fundamentals
Users that are interested in Malware-Analysis-Fundamentals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Código das aulas de Estruturas de Dados Avançadas dos cursos de LESI e LESI-N☆12Apr 14, 2025Updated last year
- OWASP Foundation Web Respository☆11May 22, 2023Updated 3 years ago
- Slides and material from my conference presentations☆16Mar 30, 2024Updated 2 years ago
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆17Nov 7, 2023Updated 2 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- X86 disassembler benchmark☆10Jun 11, 2021Updated 4 years ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 4 months ago
- Minidump loader for Binary Ninja☆16Sep 25, 2025Updated 7 months ago
- A tool to Query stackoverflow via terminal☆13Apr 17, 2022Updated 4 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- ☆10Aug 4, 2023Updated 2 years ago
- Binary Ninja Game Boy loader and architecture plugin for analysing and disassembling GB ROM.☆22Nov 17, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- HackBar plugin for Burpsuite☆27Apr 15, 2021Updated 5 years ago
- Generates dnSpy themes based on IntelliJ themes☆14Jan 1, 2021Updated 5 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- Official Website Of The Sigma Project☆22Feb 16, 2026Updated 3 months ago
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- Exports monitoring plugin for x64dbg☆22Mar 14, 2023Updated 3 years ago
- ☆12Sep 29, 2021Updated 4 years ago
- NIST SP 800-53 Rev 5 as Data☆25Apr 4, 2020Updated 6 years ago
- ☆48Nov 23, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆15Aug 11, 2020Updated 5 years ago
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- Resources for learning malware analysis and reverse engineering☆145Feb 7, 2024Updated 2 years ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- Retypd plugin for Ghidra reverse engineering framework from NSA☆28Jul 6, 2023Updated 2 years ago
- An architecture module for Binary Ninja to support msp430☆18Aug 23, 2024Updated last year
- A collection of utilities to help with analysis on the command line.☆18Aug 9, 2024Updated last year
- Malware management program and tools☆28Dec 16, 2015Updated 10 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when th…☆15May 20, 2020Updated 6 years ago
- ☆32Apr 24, 2022Updated 4 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- ☆29May 10, 2020Updated 6 years ago
- Analyze Golang with x64dbg☆28Mar 20, 2026Updated 2 months ago
- A Collection of Android Malware☆19Feb 19, 2019Updated 7 years ago
- An example of an eBPF program hooking into the kill tracepoint☆22May 26, 2023Updated 2 years ago