Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach
Malware Analysis Tutorials: a Reverse Engineering Approach This tutorial series provides a comprehensive guide to malware analysis, covering topics such as setting up a lab configuration, reverse engineering, and debugging. The tutorials are designed to be completed independently, with each lesson focusing on a specific topic and providing hands-on experience with malware analysis. The series covers topics such as VM-based analysis, ring3 debugging, anti-debugging, and more. This tutorial series is ideal for those looking to gain a deeper understanding of malware analysis and reverse engineering.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collaborative malware analysis framework with various features for automated analysis tasks.
An open source machine code decompiler that converts binary executables into readable C source code across multiple architectures and file formats.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Code to prevent a managed .NET debugger/profiler from working.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
Valkyrie is a sophisticated file verdict system that enhances malware detection through behavioral analysis and extensive file feature examination.