All Projects → bartblaze → Matire

bartblaze / Matire

Licence: mit
Malware Analysis, Threat Intelligence and Reverse Engineering: LABS

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Matire

Freki
🐺 Malware analysis platform
Stars: ✭ 285 (+418.18%)
Mutual labels:  malware-analysis, threat-intelligence, reverse-engineering
Awesome Csirt
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (+140%)
Mutual labels:  malware-analysis, threat-intelligence, reverse-engineering
Gef
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+7530.91%)
Mutual labels:  malware-analysis, reverse-engineering
Simplify
Android virtual machine and deobfuscator
Stars: ✭ 3,865 (+6927.27%)
Mutual labels:  malware-analysis, reverse-engineering
Sec skills
软件安全工程师技能表
Stars: ✭ 410 (+645.45%)
Mutual labels:  malware-analysis, reverse-engineering
Polichombr
Collaborative malware analysis framework
Stars: ✭ 307 (+458.18%)
Mutual labels:  malware-analysis, reverse-engineering
Idenlib
idenLib - Library Function Identification [This project is not maintained anymore]
Stars: ✭ 322 (+485.45%)
Mutual labels:  malware-analysis, reverse-engineering
Dex Oracle
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (+623.64%)
Mutual labels:  malware-analysis, reverse-engineering
Stringsifter
A machine learning tool that ranks strings based on their relevance for malware analysis.
Stars: ✭ 469 (+752.73%)
Mutual labels:  malware-analysis, reverse-engineering
Apklab
Android Reverse-Engineering Workbench for VS Code
Stars: ✭ 470 (+754.55%)
Mutual labels:  malware-analysis, reverse-engineering
Makin
makin - reveal anti-debugging and anti-VM tricks [This project is not maintained anymore]
Stars: ✭ 645 (+1072.73%)
Mutual labels:  malware-analysis, reverse-engineering
Pecli
CLI tool to analyze PE files
Stars: ✭ 46 (-16.36%)
Mutual labels:  malware-analysis, reverse-engineering
Misp
MISP (core software) - Open Source Threat Intelligence and Sharing Platform
Stars: ✭ 3,485 (+6236.36%)
Mutual labels:  malware-analysis, threat-intelligence
Pwndbg
Exploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+7496.36%)
Mutual labels:  malware-analysis, reverse-engineering
Macbook
《macOS软件安全与逆向分析》随书源码
Stars: ✭ 302 (+449.09%)
Mutual labels:  malware-analysis, reverse-engineering
Drakvuf Sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Stars: ✭ 384 (+598.18%)
Mutual labels:  malware-analysis, reverse-engineering
Besafe
BeSafe is robust threat analyzer which help to protect your desktop environment and know what's happening around you
Stars: ✭ 21 (-61.82%)
Mutual labels:  malware-analysis, threat-intelligence
Simpleator
Simpleator ("Simple-ator") is an innovative Windows-centric x64 user-mode application emulator that leverages several new features that were added in Windows 10 Spring Update (1803), also called "Redstone 4", with additional improvements that were made in Windows 10 October Update (1809), aka "Redstone 5".
Stars: ✭ 260 (+372.73%)
Mutual labels:  malware-analysis, reverse-engineering
Drltrace
Drltrace is a library calls tracer for Windows and Linux applications.
Stars: ✭ 282 (+412.73%)
Mutual labels:  malware-analysis, reverse-engineering
Pev
The PE file analysis toolkit
Stars: ✭ 422 (+667.27%)
Mutual labels:  malware-analysis, reverse-engineering

MaTiRe

This repository contains the LAB material used in the workshop on Malware Analysis, Threat Intelligence and Reverse Engineering. I'm naming the repository MaTiRe mostly due to current lack of inspiration.

You will need access to the slides if you wish to follow along. Those can be found on SlideShare below:

Malware analysis, threat intelligence and reverse engineering

If you are interested how this workshop came to be, check out the accompanying blog post:

Malware Analysis, Threat Intelligence and Reverse Engineering: workshop slides

About the LAB material

Some of the LABS have been created by me, but some contain actual malware. Always execute the LABS in a Virtual Machine (VM). I cannot be held reliable for any damages caused by the material in this repository.

The LABS I created myself, have been compiled on a VM as well, and can therefore contain certain clues, compression or obfuscation. Up to you to find what is relevant and in correspondence with the LAB exercises from the workshop!

Help!

If you are having issues, questions or concerns with any of the LABS or accompanying material, just reach out.

License

Note that while the license for the LAB material is MIT, the license for the slides is CC BY-NC-ND 3.0.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].