Malware Analysis Fundamentals, by EC-Council
☆25Jul 25, 2021Updated 4 years ago
Alternatives and similar repositories for Malware-Analysis-Fundamentals
Users that are interested in Malware-Analysis-Fundamentals are comparing it to the libraries listed below
Sorting:
- Código das aulas de Estruturas de Dados Avançadas dos cursos de LESI e LESI-N☆12Apr 14, 2025Updated 11 months ago
- OWASP Foundation Web Respository☆11May 22, 2023Updated 2 years ago
- Reverse Engineering Frida for Beginners, by EC-Council☆14Sep 21, 2023Updated 2 years ago
- ☆12Sep 22, 2022Updated 3 years ago
- ☆17Nov 7, 2023Updated 2 years ago
- Network Defense Essentials notes☆24Feb 3, 2022Updated 4 years ago
- A open source Python script to perform static analysis on a Malware Binary File (portable executable).☆16Jan 12, 2016Updated 10 years ago
- X86 disassembler benchmark☆10Jun 11, 2021Updated 4 years ago
- Herramienta completa de Scrapping en la Deep Web☆17Jul 24, 2025Updated 7 months ago
- Receives Twitch EventSub Webhooks and Updates the Streams Online Status☆11Mar 2, 2026Updated 2 weeks ago
- Knowledge base for reverse engineering and malware analysis☆15Jan 11, 2026Updated 2 months ago
- Minidump loader for Binary Ninja☆15Sep 25, 2025Updated 5 months ago
- Anti-Malware security solution for Windows environment.☆19Jul 10, 2021Updated 4 years ago
- Some of CrackMes made by me :)☆18Dec 24, 2021Updated 4 years ago
- ☆10Aug 4, 2023Updated 2 years ago
- Binary Ninja Game Boy loader and architecture plugin for analysing and disassembling GB ROM.☆22Nov 17, 2020Updated 5 years ago
- Generates dnSpy themes based on IntelliJ themes☆14Jan 1, 2021Updated 5 years ago
- ☆14Jan 7, 2022Updated 4 years ago
- Official Website Of The Sigma Project☆23Feb 16, 2026Updated last month
- Universal Radio Hacker: investigate wireless protocols like a boss 📡😎☆17Nov 10, 2019Updated 6 years ago
- ☆12Sep 29, 2021Updated 4 years ago
- ☆18Oct 18, 2019Updated 6 years ago
- ☆45Nov 23, 2025Updated 3 months ago
- NIST SP 800-53 Rev 5 as Data☆25Apr 4, 2020Updated 5 years ago
- Go Game Guru's Go Commentaries☆13May 20, 2016Updated 9 years ago
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- Set of IDA Pro scripts for parsing GoLang types information stored in compiled binary☆15Aug 11, 2020Updated 5 years ago
- Resources for learning malware analysis and reverse engineering☆144Feb 7, 2024Updated 2 years ago
- short crackme for Windows XP SP3 (32 bit version). ring0 stuff. IMO very fun x-)☆23Aug 11, 2023Updated 2 years ago
- Binary Ninja plugin for interacting with the OALabs HashDB service☆21Nov 1, 2024Updated last year
- Retypd plugin for Ghidra reverse engineering framework from NSA☆27Jul 6, 2023Updated 2 years ago
- An architecture module for Binary Ninja to support msp430☆18Aug 23, 2024Updated last year
- VMT hooking is a technique where you hook one (or more) VMT(Virtual Method Table) entries with a pointer to other function. Thus, when th…☆15May 20, 2020Updated 5 years ago
- ☆32Apr 24, 2022Updated 3 years ago
- isodump - ISO dump utility☆41Jun 9, 2019Updated 6 years ago
- Analyze Golang with x64dbg☆27Aug 27, 2024Updated last year
- A Collection of Android Malware☆18Feb 19, 2019Updated 7 years ago
- Invoke-DetectItEasy is a wrapper for excelent tool called Detect-It-Easy. This PS module is very useful for Threat Hunting and Forensics.☆29Feb 15, 2022Updated 4 years ago
- An example of an eBPF program hooking into the kill tracepoint☆22May 26, 2023Updated 2 years ago