fwosar / malware-analysis-resourcesLinks
A collection of resources if you want to get into malware research. Pull requests are very welcome.
☆113Updated 6 years ago
Alternatives and similar repositories for malware-analysis-resources
Users that are interested in malware-analysis-resources are comparing it to the libraries listed below
Sorting:
- Malware Samples that could be used for teaching students about malware analysis.☆58Updated last year
- Collection of resources that are made by the Malware Research community☆227Updated 2 years ago
- Resources for learning malware analysis and reverse engineering☆117Updated last year
- Source Code for 'Malware Analysis and Detection Engineering' by Abhijit Mohanta and Anoop Saldanha☆121Updated 2 years ago
- Code snips and notes☆137Updated 3 years ago
- The best resources for learning exploit development☆117Updated 5 years ago
- Understanding and analyzing carrier files workshop repo☆50Updated 5 years ago
- Malware Analysis Exercise Samples and Resources☆45Updated this week
- Research notes☆128Updated 8 months ago
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆652Updated last year
- A curated list of awesome malware analysis tools and resources☆97Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Malware Analysis Techniques, published by Packt☆75Updated 2 years ago
- A course on "Digital Forensics" designed and offered in the Computer Science Department at Texas Tech University☆193Updated last year
- The Windows Malware Analysis Reversing Core Tools☆96Updated 4 years ago
- Jupyter Notebooks for the Blue Team☆146Updated 5 months ago
- Collection of malware persistence and hunting information. Be a persistent persistence hunter!☆181Updated last month
- All binaries file of the PracticalMalwareAnalysis-Labs copied from internet☆39Updated 7 years ago
- Different learning materials☆228Updated 5 months ago
- Malicious PDF files recently considered one of the most dangerous threats to the system security. The flexible code-bearing vector of the…☆215Updated 3 years ago
- Second Part To Hell's artworks: artificial (life/evolution/intelligence)☆179Updated last year
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆668Updated last year
- IoT Digital Forensics Course with hands-on labs☆230Updated last year
- ☆32Updated 10 months ago
- Resources for learning about Exploit Development☆402Updated 4 years ago
- This repo is a collection of Ransomware reports from vendors, researchers, etc.☆119Updated 2 years ago
- Rules shared by the community from 100 Days of YARA 2024☆85Updated 7 months ago
- Creation of a laboratory for malware analysis in AWS☆102Updated 2 years ago
- Python code illustrating different operating system terminologies, techniques, and solutions☆70Updated 2 years ago
- Rules Shared by the Community from 100 Days of YARA 2023☆78Updated 2 years ago