fwosar / malware-analysis-resources
A collection of resources if you want to get into malware research. Pull requests are very welcome.
☆107Updated 6 years ago
Alternatives and similar repositories for malware-analysis-resources
Users that are interested in malware-analysis-resources are comparing it to the libraries listed below
Sorting:
- Resources for learning malware analysis and reverse engineering☆107Updated last year
- Malware Analysis Exercise Samples and Resources☆41Updated 6 months ago
- Malware Samples that could be used for teaching students about malware analysis.☆54Updated last year
- A curated list of awesome malware analysis tools and resources☆80Updated 3 years ago
- Code snips and notes☆137Updated 3 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Collection of resources that are made by the Malware Research community☆225Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆118Updated 2 years ago
- Research notes☆124Updated 5 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆638Updated 10 months ago
- ☆32Updated 6 months ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- The best resources for learning exploit development☆114Updated 5 years ago
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆562Updated last year
- Jupyter Notebooks for the Blue Team☆144Updated last month
- Malware Analysis Techniques, published by Packt☆70Updated 2 years ago
- ☆66Updated 2 years ago
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆37Updated 7 years ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆176Updated 3 months ago
- https://www.malwaretech.com/beginner-malware-reversing-challenges☆62Updated 5 years ago
- IoT Digital Forensics Course with hands-on labs☆228Updated last year
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 2 years ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆209Updated 3 years ago
- The Windows Malware Analysis Reversing Core Tools☆95Updated 4 years ago
- 0xpat blog☆100Updated 3 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- Different learning materials☆226Updated 2 months ago
- Simplified MITRE Use Cases, it describes the Attack and Detection☆45Updated 4 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 4 months ago
- ☆65Updated 2 years ago