Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach
Malware Analysis Tutorials: a Reverse Engineering Approach This tutorial series provides a comprehensive guide to malware analysis, covering topics such as setting up a lab configuration, reverse engineering, and debugging. The tutorials are designed to be completed independently, with each lesson focusing on a specific topic and providing hands-on experience with malware analysis. The series covers topics such as VM-based analysis, ring3 debugging, anti-debugging, and more. This tutorial series is ideal for those looking to gain a deeper understanding of malware analysis and reverse engineering.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A collaborative malware analysis framework with various features for automated analysis tasks.
Joe Sandbox Community provides automated cloud-based malware analysis across multiple OS platforms.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.
A tool designed to handle archive file data and augment Yara's capabilities.
Code to prevent a managed .NET debugger/profiler from working.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.