hslatman / awesome-malware-analysisLinks
A curated list of awesome malware analysis tools and resources
☆44Updated 5 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 6 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆69Updated 5 years ago
- ☆43Updated 7 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆124Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated last year
- ☆25Updated 5 years ago
- Slides, papers, etc☆32Updated last year
- General purpose repository for miscellaneous scripts, pcaps and malware IOCs that we share with the info-sec research community☆39Updated 5 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆72Updated 5 years ago
- Exploits for YARA 3.7.1 & 3.8.1☆32Updated 6 years ago
- My public presentations☆42Updated 2 years ago
- ☆100Updated 7 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆37Updated 7 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- ☆44Updated 5 years ago
- static malware analysis and report tool open source version for linux☆17Updated 8 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆95Updated 6 years ago
- Fighting String Encryption in Android Malware☆58Updated 3 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 5 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- ☆43Updated 7 years ago
- Hansel - a simple but flexible search for IDA☆25Updated 6 years ago
- ☆12Updated 5 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- a State-Machine reversing exercise☆13Updated 4 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆43Updated 7 years ago
- My conference presentations and Materials for them.☆32Updated 3 years ago