hasherezade / malware_training_vol1
Materials for Windows Malware Analysis training (volume 1)
☆1,957Updated 6 months ago
Alternatives and similar repositories for malware_training_vol1:
Users that are interested in malware_training_vol1 are comparing it to the libraries listed below
- Resources for Windows exploit development☆1,552Updated 3 years ago
- Malware samples, analysis exercises and other interesting resources.☆1,498Updated last year
- A not so awesome list of malware gems for aspiring malware analysts☆800Updated last year
- Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.☆890Updated 4 years ago
- Offensive Software Exploitation Course☆2,354Updated last year
- Educational, CTF-styled labs for individuals interested in Memory Forensics☆1,684Updated 3 years ago
- Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories☆1,106Updated 4 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,070Updated last month
- Research code & papers from members of vx-underground.☆1,174Updated 3 years ago
- A list of cyber-chef recipes and curated links☆2,049Updated 7 months ago
- Red Teaming Tactics and Techniques☆4,116Updated 4 months ago
- Some of my publicly available Malware analysis and Reverse engineering.☆773Updated 7 months ago
- A post exploitation framework designed to operate covertly on heavily monitored environments☆2,067Updated 3 years ago
- Scans all running processes. Recognizes and dumps a variety of potentially malicious implants (replaced/implanted PEs, shellcodes, hooks,…☆2,085Updated 2 weeks ago
- Binaries for the book Practical Malware Analysis☆1,201Updated 2 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,340Updated last year
- A workshop about Malware Development☆1,608Updated last year
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,752Updated 7 months ago
- Windows kernel and user mode emulation.☆1,553Updated 9 months ago
- List of Awesome Advanced Windows Exploitation References☆1,472Updated 3 years ago
- Scans a given process. Recognizes and dumps a variety of potentially malicious implants (replaced/injected PEs, shellcodes, hooks, in-mem…☆3,183Updated last month
- FLARE Obfuscated String Solver - Automatically extract obfuscated strings from malware.☆3,376Updated this week
- Organized list of my malware development resources☆1,469Updated 2 years ago
- ☆1,019Updated 7 months ago
- Course Repository for University of Cincinnati Malware Analysis Class (CS[567]038)☆766Updated 2 months ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,928Updated 2 years ago
- ☆2,652Updated 10 months ago
- Red Teaming & Pentesting checklists for various engagements☆2,522Updated 4 months ago
- ✨ A curated list of awesome threat detection and hunting resources 🕵️♂️☆3,961Updated 6 months ago