hasherezade / malware_training_vol1Links
Materials for Windows Malware Analysis training (volume 1)
☆1,989Updated 11 months ago
Alternatives and similar repositories for malware_training_vol1
Users that are interested in malware_training_vol1 are comparing it to the libraries listed below
Sorting:
- Malware samples, analysis exercises and other interesting resources.☆1,557Updated last year
- Resources for Windows exploit development☆1,583Updated 3 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆809Updated last year
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆896Updated 5 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,112Updated 4 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,207Updated 4 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,168Updated last week
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,736Updated 4 years ago
- Windows kernel and user mode emulation.☆1,663Updated 2 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆808Updated 2 years ago
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,668Updated 3 months ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,334Updated last week
- Offensive Software Exploitation Course☆2,370Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,271Updated 9 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,552Updated this week
- The FLARE team's open-source tool to identify capabilities in executable files.☆5,357Updated this week
- List of Awesome Advanced Windows Exploitation References☆1,494Updated 3 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,175Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,097Updated 3 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆777Updated 7 months ago
- Rapidly Search and Hunt through Windows Forensic Artefacts☆3,168Updated last month
- Research code & papers from members of vx-underground.☆1,244Updated 3 years ago
- Binaries for the book Practical Malware Analysis☆1,287Updated 2 years ago
- A collection of software installations scripts for Windows systems that allows you to easily setup and maintain a reverse engineering env…☆7,339Updated 3 weeks ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,139Updated last week
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,617Updated 7 months ago
- A list of cyber-chef recipes and curated links☆2,097Updated 11 months ago
- Interesting APT Report Collection And Some Special IOCs☆2,572Updated this week
- ☆541Updated 3 years ago
- Reverse engineering focusing on x64 Windows.☆5,404Updated 10 months ago