hasherezade / malware_training_vol1Links
Materials for Windows Malware Analysis training (volume 1)
☆1,991Updated 11 months ago
Alternatives and similar repositories for malware_training_vol1
Users that are interested in malware_training_vol1 are comparing it to the libraries listed below
Sorting:
- Resources for Windows exploit development☆1,591Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,564Updated last year
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆898Updated 5 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,265Updated 5 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆810Updated 2 years ago
- Red Teaming Tactics and Techniques☆4,296Updated 10 months ago
- Research code & papers from members of vx-underground.☆1,252Updated 3 years ago
- List of Awesome Advanced Windows Exploitation References☆1,499Updated 3 years ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆779Updated 7 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆814Updated last year
- HackSys Extreme Vulnerable Driver (HEVD) - Windows & Linux☆2,693Updated 4 months ago
- Offensive Software Exploitation Course☆2,371Updated 2 years ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,103Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,181Updated last month
- Organized list of my malware development resources☆1,576Updated 3 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,116Updated 4 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,794Updated last year
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,351Updated last month
- ☆543Updated 3 years ago
- Windows kernel and user mode emulation.☆1,671Updated 2 months ago
- ☆1,050Updated last year
- Binaries for the book Practical Malware Analysis☆1,294Updated 3 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,568Updated 10 months ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,737Updated 4 years ago
- Collection of various malicious functionality to aid in malware development☆1,681Updated last year
- Leaked pentesting manuals given to Conti ransomware crooks☆1,037Updated 3 years ago
- Tools & Interesting Things for RedTeam Ops☆2,205Updated last week
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆647Updated 11 months ago
- Malware Configuration And Payload Extraction☆2,495Updated this week
- This map lists the essential techniques to bypass anti-virus and EDR☆2,841Updated 2 months ago