vvelitkn / Malware-Research-Valuable-ResourcesLinks
Found resources in my malware researching adventure.
☆16Updated 2 years ago
Alternatives and similar repositories for Malware-Research-Valuable-Resources
Users that are interested in Malware-Research-Valuable-Resources are comparing it to the libraries listed below
Sorting:
- IDA Python scripts☆37Updated 3 months ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 6 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated last month
- Malware Muncher is a proof-of-concept Python script that utilizes the Frida framework for binary instrumentation and API hooking, enablin…☆46Updated 2 years ago
- My malware analysis code snippets☆27Updated 2 years ago
- ☆19Updated last year
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆15Updated 3 years ago
- ☆27Updated 7 months ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Updated last year
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆45Updated last year
- ☆25Updated 2 years ago
- Dataset of packed ELF samples☆19Updated 2 years ago
- Hackers to Hackers Conference (H2HC) presentation in São Paulo☆36Updated 7 months ago
- General malware analysis stuff☆37Updated 10 months ago
- A Repository to Track Anti-Forensic Techniques☆110Updated 2 years ago
- Progress of learning kernel development☆14Updated 2 years ago
- bootloaders.io is a curated list of known malicious bootloaders for various operating systems. The project aims to assist security profes…☆62Updated last year
- ☆22Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆30Updated last year
- ☆39Updated last year
- ☆28Updated 5 months ago
- Malware Analysis tools☆26Updated 10 months ago
- ☆37Updated 4 months ago
- ☆24Updated 3 years ago
- This repository contains the public work I produced, wheter it is research, post, slides, sometimes videos, and materials of my talks.☆51Updated 3 months ago
- Make an Linux Kernel rootkit visible again.☆53Updated 4 months ago
- BINARLY Research Tools and PoCs☆36Updated 9 months ago
- My Preparations for the "macOS Control Bypasses (EXP-312-osmr)" Course By OffensiveSecurity.☆24Updated 3 years ago