Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach
Malware Analysis Tutorials: a Reverse Engineering Approach This tutorial series provides a comprehensive guide to malware analysis, covering topics such as setting up a lab configuration, reverse engineering, and debugging. The tutorials are designed to be completed independently, with each lesson focusing on a specific topic and providing hands-on experience with malware analysis. The series covers topics such as VM-based analysis, ring3 debugging, anti-debugging, and more. This tutorial series is ideal for those looking to gain a deeper understanding of malware analysis and reverse engineering.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool for identifying and analyzing Java serialized objects in network traffic
A tool that generates pseudo-malicious files to trigger YARA rules.
A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities
A framework for creating XNU based rootkits for OS X and iOS security research
Collection of Python scripts for automating tasks and enhancing IDA Pro functionality
A Burp plugin for identifying potential vulnerabilities in web applications
A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.