Red Teaming and Malware Analysis
Ctrlk
  • About
  • Red Teaming
  • Cheat Sheet
  • Active Directory 101
  • Fuzzing and Web
  • Initial Foothold
  • Privilege Escalation (Privesc)
  • Lateral Movement (Pivoting)
  • Persistence
  • Command and Control (C&C)
  • Data Exfiltration
  • CVE & Exploits / CTF
  • Tools
  • Resources
  • Pwnage
  • Malware Analysis
  • Unpacking
  • Basic tips
  • Malware instrumentation with frida
  • Tools
  • Resources
    • DFIR FTK Imager
    • Convert IP Range into CIDR
    • Parsing Large Raw Files and Excluding Country IP Address Ranges
    • Windows Logs Automation
    • Windows EventViewer Analysis | DFIR
    • Prevent Windows shutdown after license expire
    • Firewall raw Logs
  • Mobile
    • Tools
    • Reverse iOS ipa
    • Reverse Android APKs
    • Basic tips
    • Resources
  • IoT / Reverse / Firmware
    • Basic tips
    • Reverse IoT devices
    • Tools
    • Resources
Powered by GitBook
On this page
  • Malware analysis with dynamic binary instrumentation (FRIDA)
  • Sources

Was this helpful?

Resources

LogoGitHub - jstrosch/malware-samples: Malware samples, analysis exercises and other interesting resources.GitHub

Malware templates: https://github.com/jstrosch/malware-samples/tree/master/maldoc_templates

LogoPEB: Where Magic Is StoredMalware Analysis, News and Indicators

Malware analysis with dynamic binary instrumentation (FRIDA)

LogoMalware Analysis with Dynamic Binary Instrumentation FrameworksBlackBerry
LogoGitHub - OALabs/frida-extract: Frida.re based RunPE (and MapViewOfSection) extraction toolGitHub
LogoGitHub - n1ght-w0lf/HawkEye: Malware dynamic instrumentation tool based on frida frameworkGitHub

Sources

LogoMalAPI.iomalapi.io

PreviousOnline ToolsNextDFIR FTK Imager

Last updated 1 year ago

Was this helpful?