theseongsu / presentationLinks
Presentation slides, blogs, and videos of my conference presentations.
☆26Updated last year
Alternatives and similar repositories for presentation
Users that are interested in presentation are comparing it to the libraries listed below
Sorting:
- ☆46Updated last month
- ☆22Updated last year
- ☆114Updated 2 weeks ago
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 6 months ago
- Signature-based detection of malware features based on Windows API call sequences. It's like YARA for sandbox API traces!☆82Updated 2 years ago
- Malware Analysis tools☆26Updated last year
- IDA Python scripts☆40Updated 8 months ago
- shared samples from #dailyphish and/or #apt tweets☆41Updated 3 months ago
- A small utility to deal with malware embedded hashes.☆52Updated 2 years ago
- ☆27Updated last year
- ☆25Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated 11 months ago
- Tools developed by the Zscaler ThreatLabz Threat Intelligence team☆90Updated last week
- ☆75Updated 2 years ago
- GarbageMan is a set of tools for analyzing .NET binaries through heap analysis.☆118Updated 2 years ago
- IDA Pro plugin for recognizing known hashes of API function names☆82Updated 3 years ago
- ☆39Updated last year
- ☆84Updated 3 months ago
- Writeups, PoCs of the bugs I found while preparing for the Pwn2Own Miami 2023 contest targeting UaGateway from the OPC UA Server category…☆63Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆37Updated 11 months ago
- Use YARA rules on Time Travel Debugging traces☆96Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆67Updated 2 years ago
- Collection of tips, tools, arsenal and techniques I've learned during RE and other CyberSecStuff☆57Updated 2 months ago
- General malware analysis stuff☆37Updated last year
- Some of my Malware Analysis writeups☆48Updated 2 months ago
- GoResolver is a Go analysis tool using both Go symbol extraction and Control Flow Graph (CFG) similarity to identify and resolve the func…☆75Updated 3 months ago
- SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create repr…☆120Updated 9 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆64Updated 3 years ago
- ☆39Updated last year