Malware
Malware Analysis
Materials and techniques for teaching malware analysis to students.
Course materials for Malware Analysis by RPISEC
4k stars
329 watching
788 forks
last commit: over 2 years ago
Linked from 6 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
rpisec/mbe | A repository containing course materials and resources for teaching binary exploitation and reverse engineering to programmers. | 5,547 |
hasherezade/malware_training_vol1 | Teaches various techniques used by malware authors to analyze Windows malware | 1,942 |
mytechnotalent/reverse-engineering | A comprehensive tutorial covering reverse engineering techniques and concepts for various architectures | 11,544 |
ivrodriguezca/re-ios-apps | A course teaching reverse engineering of iOS applications to improve application security | 2,669 |
marcoramilli/malwaretrainingsets | Provides machine learning datasets for malware analysis | 227 |
jstrosch/malware-samples | Provides access to malicious files and malware analysis resources | 1,491 |
rhiever/data-analysis-and-machine-learning-projects | A repository of teaching materials, code, and data for various data analysis and machine learning projects. | 6,153 |
cert-polska/karton | A framework for building flexible and lightweight malware analysis pipelines | 395 |
jpcertcc/aa-tools | A collection of tools and scripts for analyzing malware, reverse engineering malware, and decrypting encrypted data | 455 |
telekom-security/malware_analysis | An analysis repository providing scripts, signatures, and IOCs for detecting and analyzing malware. | 110 |
weisong-ucr/mab-malware | An open-source reinforcement learning framework to generate adversarial examples for malware classification models. | 41 |
cert-polska/drakvuf-sandbox | Automated malware analysis system with a web interface and installer app | 1,075 |
raspirus/raspirus | A malware detection tool with signature-based scanning and file integrity checks | 137 |
stamparm/maltrail | Detects and analyzes malicious traffic patterns to identify potential security threats. | 6,642 |