Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach
Malware Analysis Tutorials: a Reverse Engineering Approach This tutorial series provides a comprehensive guide to malware analysis, covering topics such as setting up a lab configuration, reverse engineering, and debugging. The tutorials are designed to be completed independently, with each lesson focusing on a specific topic and providing hands-on experience with malware analysis. The series covers topics such as VM-based analysis, ring3 debugging, anti-debugging, and more. This tutorial series is ideal for those looking to gain a deeper understanding of malware analysis and reverse engineering.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Code to prevent a managed .NET debugger/profiler from working.
An open-source dynamic analysis framework that intercepts and monitors API calls in Android applications using the Android Substrate framework.
A sandbox for quickly sandboxing known or unknown families of Android Malware
A program to manage yara ruleset in a database with support for different databases and configuration options.
CAPA is a static analysis tool that detects and reports capabilities in executable files across multiple formats, mapping findings to MITRE ATT&CK tactics and techniques.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.