jeFF0Falltrades / Malware-WriteupsLinks
A collection of my reverse engineering and malware analysis write-ups
☆21Updated 5 years ago
Alternatives and similar repositories for Malware-Writeups
Users that are interested in Malware-Writeups are comparing it to the libraries listed below
Sorting:
- ☆64Updated last year
- Tools that trigger False Positive AV alerts☆53Updated last year
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Updated last month
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆67Updated 2 years ago
- This course is designed to expose students to advanced exploitation techniques. Topics include the use of automated exploitation tools a…☆30Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- Help deobfuscate VBScript☆17Updated 3 years ago
- ☆27Updated last year
- open source malware analysis and research notes dump☆26Updated 2 years ago
- Collection of my own detection rules☆20Updated 6 months ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- MITRE TTPs derived from Conti's leaked playbooks from XSS.IS☆40Updated 4 years ago
- This repo contains miscellaneous tools to aid in your malware analysis.☆13Updated 4 years ago
- Generates YARA rules to detect malware using API hashing☆17Updated 4 years ago
- Rapidly building a Windows 10 system to use for dynamic malware analysis (sandbox), sending data to Elastic Cloud.☆50Updated 2 years ago
- ☆24Updated last year
- Userland API monitor for threat hunting☆58Updated 5 years ago
- Scripts, Yara rules and other files developed during malware investigations☆25Updated 3 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆22Updated 3 years ago
- Static Decryptor for IcedID Malware☆18Updated 3 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- bad stuffs by bad guys☆49Updated 3 years ago
- Imphash-like calculation on Golang binaries☆49Updated 3 years ago
- My Malware Analysis Reports☆24Updated 3 years ago
- ☆23Updated 2 years ago
- Exploits made practicing for OSCE☆23Updated 5 years ago
- Identifies metadata of .NET binary files.☆21Updated last year