intezer / Malware-Reverse-Engineering-for-Beginners
This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.
☆60Updated 3 years ago
Alternatives and similar repositories for Malware-Reverse-Engineering-for-Beginners:
Users that are interested in Malware-Reverse-Engineering-for-Beginners are comparing it to the libraries listed below
- Malware Samples that could be used for teaching students about malware analysis.☆53Updated last year
- Hive v5 file decryption algorithm☆34Updated 2 years ago
- ☆135Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- A collection of small scripts and tools for deobfuscation and malware analysis.☆66Updated 2 years ago
- ☆66Updated 2 years ago
- ☆80Updated 4 months ago
- Rules Shared by the Community from 100 Days of YARA 2023☆76Updated 2 years ago
- Lena's scripts/code/resources for malware analysis☆26Updated 10 months ago
- Get started with writing your first ever Windows Driver☆32Updated last year
- General malware analysis stuff☆36Updated 7 months ago
- Virus.xcheck is a Python tool designed to bulk verify the existence of file hashes in the Virus Exchange database and fetch download URLs…☆53Updated last week
- A full analysis report detailing as much as possible of a Malware or a Threat☆28Updated 9 months ago
- IDA Python scripts☆34Updated this week
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆44Updated 2 years ago
- ☆39Updated last month
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆51Updated 4 months ago
- ☆84Updated 2 years ago
- Cheat sheet to detect and remove linux kernel rootkit☆55Updated 4 months ago
- Just my findings of malwares☆44Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 5 years ago
- Reverse Engineering and Debugging Malware☆30Updated 2 years ago
- ☆27Updated 4 months ago
- A Repository to Track Anti-Forensic Techniques☆104Updated 2 years ago
- Configuration Extractor for BlackCat Ransomware☆30Updated 3 years ago
- APT hub, It help's research to collect information and data on the latest APT activities. It collects data on APT profiles, IOCs(1 yr), a…☆50Updated last month
- Malware Analysis Tools☆30Updated 5 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆49Updated 2 weeks ago
- ☆37Updated last year
- Detection rule validation☆41Updated last year