hasherezade / malware_training_vol1
Materials for Windows Malware Analysis training (volume 1)
☆1,937Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for malware_training_vol1
- Resources for Windows exploit development☆1,528Updated 2 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,478Updated 10 months ago
- A not so awesome list of malware gems for aspiring malware analysts☆797Updated last year
- Research code & papers from members of vx-underground.☆1,146Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆2,969Updated last week
- Offensive Software Exploitation Course☆2,343Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,739Updated 5 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,044Updated 3 years ago
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,661Updated 3 years ago
- Red Teaming Tactics and Techniques☆4,065Updated 2 months ago
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆884Updated 4 years ago
- Windows kernel and user mode emulation.☆1,516Updated 7 months ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,106Updated 4 years ago
- List of Awesome Advanced Windows Exploitation References☆1,458Updated 2 years ago
- Some of my publicly available Malware analysis and Reverse engineering.☆762Updated 5 months ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆758Updated 3 weeks ago
- My curated list of awesome links, resources and tools on infosec related topics☆1,060Updated 7 months ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,035Updated 2 weeks ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,104Updated 2 weeks ago
- Collection of various malicious functionality to aid in malware development☆1,498Updated 8 months ago
- A workshop about Malware Development☆1,585Updated last year
- ☆1,009Updated 6 months ago
- Binaries for the book Practical Malware Analysis☆1,182Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆2,337Updated 11 months ago
- Organized list of my malware development resources☆1,435Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,484Updated last year
- Volatility 3.0 development☆2,704Updated this week
- This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be…☆603Updated 4 months ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆2,498Updated 4 years ago