Malware&Rootkit
Malware
- How to start RE/malware analysis?
- CS6038/CS5138 Malware Analysis, UC
- Flare VM fully customizable, Windows-based security distribution for malware analysis, incident response, penetration testing, etc.
- Snojan Analysis
- Malware analysis, threat intelligence and reverse engineering slide
- Dissecting mobile native code packers. A case study
- Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection repo
- APT
- r2kit A set of scripts for a radare-based malware code analysis workflow
- Cheat Sheet for Analyzing Malicious Software
- https://zeltser.com/analyzing-malicious-documents/
- Tools for Investigating Malicious URLs
- Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1
- Hiding Call To Ptrace
- Malware related posts on 0xdf hacks stuff
- Emotet Malware Analysis
- MwEmu Malware emulator written in Python 3 (based on Unicorn/pefile/Capstone).
- Building a custom malware sandbox with PANDA - Part 1
- Robbinhood Malware Analysis with Radare2
- Bynary analysis course/Malware
- Analysis of King Ouroboros Ransomware
- Emotet malware analysis. Part 1
- Fileless Malware and Process Injection in Linux
- The Art Of Mac Malware
Rootkit
- HIDEDRV analysys
- Intercepting System Calls and Dispatchers – Linux
- Don’t Get Kicked Out! A Tale of Rootkits and Other Backdoors
Services
- any.run INTERACTIVE MALWARE HUNTING SERVICE