hslatman / awesome-malware-analysis
A curated list of awesome malware analysis tools and resources
☆44Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-malware-analysis
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆70Updated 4 years ago
- HEVD Multi-Exploit by m_101☆23Updated 6 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 3 years ago
- Capture The Flag Binary fuzzer for Heap challanges☆38Updated 6 years ago
- ssdeep cluster analysis for malware files☆29Updated 4 years ago
- #INFILTRATE20 raptor's party pack.☆28Updated 10 months ago
- A Fuzzer for Windows NDIS Drivers OID Handlers☆91Updated 3 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 6 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 3 months ago
- ☆41Updated 6 years ago
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- Exploit code used for the HackSysExtremeVulnerableDriver.☆44Updated 6 years ago
- My conference presentations and publications☆26Updated 2 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆66Updated 4 years ago
- ActiveMime File Format Documentation☆17Updated 3 years ago
- Proof of Concept's provided by Source Incite☆37Updated 7 years ago
- Telsy CTI Research Team☆57Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆17Updated 5 years ago
- A fork of AFL for fuzzing Windows binaries☆20Updated 6 years ago
- Tools for instrumenting Windows Defender's mpengine.dll☆36Updated 6 years ago
- a State-Machine reversing exercise☆12Updated 3 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 4 years ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆93Updated 5 years ago
- My conference presentations and Materials for them.☆32Updated 2 years ago
- Fighting String Encryption in Android Malware☆57Updated 2 years ago