Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach Logo

Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach

0
Free
Visit Website

Malware Analysis Tutorials: a Reverse Engineering Approach This tutorial series provides a comprehensive guide to malware analysis, covering topics such as setting up a lab configuration, reverse engineering, and debugging. The tutorials are designed to be completed independently, with each lesson focusing on a specific topic and providing hands-on experience with malware analysis. The series covers topics such as VM-based analysis, ring3 debugging, anti-debugging, and more. This tutorial series is ideal for those looking to gain a deeper understanding of malware analysis and reverse engineering.

FEATURES

ALTERNATIVES

A collection of resources for beginners to learn assembly language.

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

A PowerShell obfuscation detection framework designed to highlight the limitations of signature-based detection and provide a scalable means of detecting known and unknown obfuscation techniques.

A portable version of XSSHunter.com for finding and exploiting Cross-Site Scripting (XSS) vulnerabilities.

FLARE Obfuscated String Solver (FLOSS) automatically extracts and deobfuscates strings from malware binaries using advanced static analysis techniques.

Tplmap is a tool for detecting and exploiting server-side template injection vulnerabilities.

A better version of my xssfinder tool that scans for different types of XSS on a list of URLs.

Krakatau provides an assembler and disassembler for Java bytecode, supporting conversion, creation, examination, comparison, and decompilation of Java binaries.

PINNED