Malware Analysis Tutorials: a Reverse Engineering Approach This tutorial series provides a comprehensive guide to malware analysis, covering topics such as setting up a lab configuration, reverse engineering, and debugging. The tutorials are designed to be completed independently, with each lesson focusing on a specific topic and providing hands-on experience with malware analysis. The series covers topics such as VM-based analysis, ring3 debugging, anti-debugging, and more. This tutorial series is ideal for those looking to gain a deeper understanding of malware analysis and reverse engineering.
FEATURES
ALTERNATIVES
RetDec is a versatile machine-code decompiler with support for various file formats and architectures.
Scans running processes for potentially malicious implants and dumps them.
UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.
A collection of Yara signatures for identifying malware and other threats
A tool that generates Yara rules from training data using logistic regression and random forest classifiers.
PINNED
InfoSecHired
An AI-powered career platform that automates the creation of cybersecurity job application materials and provides company-specific insights for job seekers.
Fabric Platform by BlackStork
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
Mandos Brief Newsletter
Stay ahead in cybersecurity. Get the week's top cybersecurity news and insights in 8 minutes or less.
System Two Security
An AI-powered platform that automates threat hunting and analysis by processing cyber threat intelligence and generating customized hunt packages for SOC teams.
Aikido Security
Aikido is an all-in-one security platform that combines multiple security scanning and management functions for cloud-native applications and infrastructure.
Permiso
Permiso is an Identity Threat Detection and Response platform that provides comprehensive visibility and protection for identities across multiple cloud environments.
Wiz
Wiz Cloud Security Platform is a cloud-native security platform that enables security, dev, and devops to work together in a self-service model, detecting and preventing cloud security threats in real-time.
Adversa AI
Adversa AI is a cybersecurity company that provides solutions for securing and hardening machine learning, artificial intelligence, and large language models against adversarial attacks, privacy issues, and safety incidents across various industries.