hasherezade / malware_training_vol1Links
Materials for Windows Malware Analysis training (volume 1)
☆1,997Updated last year
Alternatives and similar repositories for malware_training_vol1
Users that are interested in malware_training_vol1 are comparing it to the libraries listed below
Sorting:
- Resources for Windows exploit development☆1,600Updated 3 years ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆899Updated 5 years ago
- A not so awesome list of malware gems for aspiring malware analysts☆816Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,566Updated last year
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆781Updated 8 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,126Updated 4 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,289Updated 5 months ago
- Research code & papers from members of vx-underground.☆1,262Updated 3 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆818Updated last year
- Windows kernel and user mode emulation.☆1,706Updated 3 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,194Updated last month
- Offensive Software Exploitation Course☆2,373Updated 2 years ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,739Updated 4 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,373Updated last month
- ☆545Updated 3 years ago
- Knowledge base of exploit mitigations available across numerous operating systems, architectures and applications and versions.☆906Updated last year
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,161Updated this week
- Binaries for the book Practical Malware Analysis☆1,305Updated 3 years ago
- List of Awesome Advanced Windows Exploitation References☆1,505Updated 3 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,102Updated 3 years ago
- ☆1,052Updated last year
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,721Updated 4 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,272Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,318Updated 10 months ago
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,586Updated this week
- Reverse engineering focusing on x64 Windows.☆5,437Updated 11 months ago
- A list of cyber-chef recipes and curated links☆2,117Updated last year
- Organized list of my malware development resources☆1,584Updated 3 years ago
- A workshop about Malware Development☆1,682Updated 2 years ago
- ☆2,121Updated 2 years ago