hslatman / awesome-malware-analysisLinks
A curated list of awesome malware analysis tools and resources
☆44Updated 4 years ago
Alternatives and similar repositories for awesome-malware-analysis
Users that are interested in awesome-malware-analysis are comparing it to the libraries listed below
Sorting:
- Extract OLEv1 objects from RTF files by instrumenting Word☆51Updated 5 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things. Inspired by awesom☆70Updated 5 years ago
- ☆43Updated 6 years ago
- ssdeep cluster analysis for malware files☆31Updated 5 years ago
- Presented hardware reverse engineering workshops since 2019☆61Updated 11 months ago
- Public documents related to my talk "Bypass Windows Exploit Guard ASR" at Offensive Con 2019.☆95Updated 6 years ago
- Fighting String Encryption in Android Malware☆59Updated 3 years ago
- This is just my personal compilation of APT malware from whitepaper releases, documents and malware samples from my personal research.☆31Updated 5 years ago
- Radare2 Metadata Extraction to Elasticsearch☆23Updated last year
- Malware samples observed in the wild from time to time☆12Updated 5 years ago
- open source malware analysis and research notes dump☆26Updated last year
- Telsy CTI Research Team☆57Updated 4 years ago
- Shellcode emulator written with Unicorn Framework With Process Dump Emulation Environment☆123Updated 4 years ago
- All the materials in BlueHat 2019 Seattle will be realeased here.☆68Updated 5 years ago
- moved to: https://github.com/alphaSeclab/awesome-reverse-engineering☆21Updated 5 years ago
- Royal APT - APT15 - Related Information from NCC Group Cyber Defense Operations Research☆53Updated 7 years ago
- static malware analysis and report tool open source version for linux☆17Updated 8 years ago
- Rekall Memory Forensic Framework☆32Updated 5 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- x86_64 linux rootkit using debug registers☆52Updated 3 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆24Updated 5 years ago
- ☆28Updated 4 years ago
- Rootkit Detector for UNIX☆61Updated last year
- A summary about different projects/presentations/tools to test how to evade malware sandbox systems☆52Updated 6 years ago
- Flare-On solutions☆36Updated 5 years ago
- Repository of Yara rules created by the Stratosphere team☆26Updated 4 years ago
- Dynamic PowerShell Analysis Framework Based Upon PowerShell Debugging Functionality☆83Updated 2 years ago
- My public presentations☆41Updated 2 years ago
- Linux kernel rootkit using kprobes (From http://phrack.org/issues/67/6.html)☆38Updated 10 years ago