jstrosch / learning-malware-analysisLinks
This repository contains sample programs that mimick behavior found in real-world malware. The goal is to provide source code that can be compiled and used for learning purposes, without having to worry about handling live malware.
☆639Updated 10 months ago
Alternatives and similar repositories for learning-malware-analysis
Users that are interested in learning-malware-analysis are comparing it to the libraries listed below
Sorting:
- This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.☆564Updated last year
- Collection of resources that are made by the Malware Research community☆226Updated last year
- Practical Windows Forensics Training☆665Updated last year
- Different learning materials☆225Updated 2 months ago
- A curated list of awesome Memory Forensics for DFIR☆445Updated 3 months ago
- DFIR LABS - A compilation of challenges that aims to provide practice in simple to advanced concepts in the following topics: Digital For…☆212Updated 3 months ago
- ☆442Updated 2 years ago
- The goal of this repo is to archive artifacts from all versions of various OS's and categorizing them by type. This will help with artifa…☆597Updated 2 months ago
- Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress!☆354Updated 9 months ago
- MBC content in markdown☆450Updated last month
- Everything related to Linux Forensics☆701Updated last year
- CLI tools for forensic investigation of Windows artifacts☆339Updated 7 months ago
- MemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR☆627Updated 2 months ago
- Labs for Practical Malware Analysis & Triage☆974Updated last month
- Jupyter Notebooks for the Blue Team☆144Updated 2 months ago
- IATelligence is a Python script that will extract the IAT of a PE file and request GPT to get more information about the API and the ATT&…☆362Updated 2 years ago
- Purple Team Resources for Enterprise Purple Teaming: An Exploratory Qualitative Study by Xena Olsen.☆652Updated last year
- ☆516Updated 7 months ago
- Map tracking ransomware, by OCD World Watch team☆468Updated 2 months ago
- A resource containing all the tools each ransomware gangs uses☆1,041Updated this week
- Awesome list of keywords and artifacts for Threat Hunting sessions☆575Updated last month
- AV/EDR Evasion Lab for Training & Learning Purposes☆1,261Updated 3 weeks ago
- This is a repository of resource about Malware techniques☆797Updated 2 years ago
- ☆363Updated this week
- This repository is a compilation of all APT simulations that target many vital sectors,both private and governmental. The simulation inc…☆653Updated last month
- Forensics Wiki, a wiki devoted to information about digital forensics (also known as computer forensics)☆273Updated this week
- ☆159Updated last year
- Collection of Event ID ressources useful for Digital Forensics and Incident Response☆615Updated 11 months ago
- This repository contains indicators of compromise (IOCs) of our various investigations.☆258Updated last week
- Some of my publicly available Malware analysis and Reverse engineering.☆808Updated 11 months ago