Red Teaming and Malware Analysis
search
⌘Ctrlk
Red Teaming and Malware Analysis
  • About
  • Red Teaming
  • Cheat Sheet
  • Active Directory 101
  • Fuzzing and Web
  • Initial Foothold
  • Privilege Escalation (Privesc)
  • Lateral Movement (Pivoting)
  • Persistence
  • Command and Control (C&C)
  • Data Exfiltration
  • CVE & Exploits / CTF
  • Tools
  • Resources
  • Pwnage
  • Malware Analysis
  • Unpacking
  • Basic tips
  • Malware instrumentation with frida
  • Tools
  • Resources
    • DFIR FTK Imager
    • Convert IP Range into CIDR
    • Parsing Large Raw Files and Excluding Country IP Address Ranges
    • Windows Logs Automation
    • Windows EventViewer Analysis | DFIR
    • Prevent Windows shutdown after license expire
    • Firewall raw Logs
  • Mobile
    • Tools
    • Reverse iOS ipa
    • Reverse Android APKs
    • Basic tips
    • Resources
  • IoT / Reverse / Firmware
    • Basic tips
    • Reverse IoT devices
    • Tools
    • Resources
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

Resources

LogoGitHub - jstrosch/malware-samples: Malware samples, analysis exercises and other interesting resources.GitHubchevron-right

Malware templates: https://github.com/jstrosch/malware-samples/tree/master/maldoc_templatesarrow-up-right

LogoPEB: Where Magic Is StoredMalware Analysis, News and Indicatorschevron-right

hashtag
Malware analysis with dynamic binary instrumentation (FRIDA)

Malware Analysis with Dynamic Binary Instrumentation FrameworksBlackBerrychevron-right
LogoGitHub - OALabs/frida-extract: Frida.re based RunPE (and MapViewOfSection) extraction toolGitHubchevron-right
LogoGitHub - n1ght-w0lf/HawkEye: Malware dynamic instrumentation tool based on frida frameworkGitHubchevron-right

hashtag
Sources

LogoMalAPI.iomalapi.iochevron-right

PreviousOnline Toolschevron-leftNextDFIR FTK Imagerchevron-right

Last updated 1 year ago

  • Malware analysis with dynamic binary instrumentation (FRIDA)
  • Sources