Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach Logo

Dr. Fu's Security Blog: Malware Analysis Tutorials: a Reverse Engineering Approach

0
Free
Updated 11 March 2025
Visit Website

Malware Analysis Tutorials: a Reverse Engineering Approach This tutorial series provides a comprehensive guide to malware analysis, covering topics such as setting up a lab configuration, reverse engineering, and debugging. The tutorials are designed to be completed independently, with each lesson focusing on a specific topic and providing hands-on experience with malware analysis. The series covers topics such as VM-based analysis, ring3 debugging, anti-debugging, and more. This tutorial series is ideal for those looking to gain a deeper understanding of malware analysis and reverse engineering.

FEATURES

SIMILAR TOOLS

A tool for identifying and analyzing Java serialized objects in network traffic

A tool that generates pseudo-malicious files to trigger YARA rules.

A wordlist to bruteforce for Local File Inclusion (LFI) vulnerabilities

A framework for creating XNU based rootkits for OS X and iOS security research

Collection of Python scripts for automating tasks and enhancing IDA Pro functionality

A Burp plugin for identifying potential vulnerabilities in web applications

Microservice for scanning files with Yara

A Windows context menu integration tool that scans files and folders for malware patterns, crypto signatures, and malicious documents using Yara rules and PEID signatures.

Find exploits in local and online databases instantly

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved