恶意代码分析学习笔记
☆10Dec 29, 2015Updated 10 years ago
Alternatives and similar repositories for malware-analysis
Users that are interested in malware-analysis are comparing it to the libraries listed below
Sorting:
- In this training will be covered about a very basic step for malware analysis. Using several free tools to recognize malware behavior. Si…☆12May 25, 2016Updated 9 years ago
- Malware analyses and helpful scripts☆29May 26, 2022Updated 3 years ago
- List of scripts used for malware analysis☆15Aug 10, 2015Updated 10 years ago
- Malware analysis tool☆22Apr 27, 2025Updated 10 months ago
- A collection of offensive tools I've hacked together for CTFs and such☆20Aug 9, 2016Updated 9 years ago
- Android Malware Analysis Tutorial | Android恶意代码分析教程☆128Aug 9, 2012Updated 13 years ago
- Next-Toggle is just a simple plug and use, theme toggle button with multiple light and dark themes.☆11May 9, 2024Updated last year
- 西安电子科技大学软件学院Web工程Project☆13Jul 26, 2018Updated 7 years ago
- 山东大学代Go跑腿项目☆10Mar 10, 2018Updated 7 years ago
- Introductory software reverse engineering tutorial for beginners☆36Jun 2, 2019Updated 6 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Jan 20, 2023Updated 3 years ago
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)☆16Oct 19, 2016Updated 9 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- A malware sandoxed with gdb☆15Jun 27, 2016Updated 9 years ago
- GPO Bypass is a tool / proof-of-concept that highlights how one can bypass Group Policy enforced policies. It uses Firefox as an example.☆14Jan 28, 2023Updated 3 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- ☆20Feb 8, 2026Updated 3 weeks ago
- MFT Fast Transcoder is a fast forensic tool to analyze MFT of NTFS partitions.☆12Feb 27, 2023Updated 3 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- 2018年全国大学生计算机应用能力大赛之住房月租金预测大数据赛☆15Jan 13, 2019Updated 7 years ago
- React Router Pagination☆13Feb 26, 2026Updated last week
- Indicator of Compromise Mapping Service☆12Apr 15, 2014Updated 11 years ago
- Malware Analysis and Storage System - Server repository☆12Jul 15, 2022Updated 3 years ago
- Function ID for Malware Analysis☆13Jul 6, 2020Updated 5 years ago
- This repo contains materials from Just Hit the Core CTF team workshops organized thanks to KNI Kernel at AGH University of Science and Te…☆11Jan 10, 2018Updated 8 years ago
- Threat Hunting Malware Infrastructure☆11Dec 3, 2023Updated 2 years ago
- Static and automated/dynamic malware analysis☆47Sep 28, 2015Updated 10 years ago
- A beautiful drag-and-drop app using Next.js v13.4, React Beautiful DND, TypeScript, and Tailwind CSS for modern, seamless interactions☆13Oct 7, 2024Updated last year
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- 🌻 小花的时间机器 / Undertale 存档修改器☆13Sep 21, 2024Updated last year
- Fault code reader☆11Oct 31, 2016Updated 9 years ago
- Repository for team's work on the Microsoft Malware Classification Challenge Kaggle competition.☆11Mar 17, 2015Updated 10 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- SSDT_process_hide_protect☆10Jul 17, 2014Updated 11 years ago
- McAfee Active Response (MAR) client library for use with the OpenDXL Python Client☆10Mar 17, 2020Updated 5 years ago
- app爬虫☆11May 19, 2018Updated 7 years ago
- Digital Forensics and Incident Response notes and Autopsy tool walkthrough☆11Feb 3, 2022Updated 4 years ago
- PE文件加载与解析工具☆10May 17, 2017Updated 8 years ago