搜索资源列表
ameagle
- These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and all these are original.Its very
5
- Executing malware in a controlled environment is one of the most popular and effective methods of extracting the behavior characters of malware. In this paper, we propose a dynamic analysis technique to explore the different behaviors of malw
IS-Fighting-Project
- Android平台上基于静态行为分析的恶意软件检测系统。本系统基于PCA-LDA算法,可以对Android的APK程序解包,分析其是否为恶意软件-Android platform malware detection system based on the analysis of the static behavior. PCA-LDA-based algorithms, the system can be on the Android APK program unpack analysis is
npe_portable
- For reverse engineering and malware analysis
SyScan2013_DAY1_SPEAKER03_Nguyen_Anh_Quynh_Optico
- OptiCode: Machine Code Deobfuscation for Malware Analysis Nguyen Anh Quynh, COSEINC <aquynh -at- gmail.com> Syscan Singapore 2013, April 25th
PyEmu src and docs
- PyEmu tries to provide a fully scr iptable IA-32 emulator in python. The aim is for security researchers and malware analysis. By having a flexible community driven emulator in a high level language one can roll their own purpose driven scr ipts to s
malheur-0.5.2.tar
- Malheur是一个自动化的恶意软件分析工具,它在沙箱(sandbox)中记录恶意软件的程序行为。开发Malheur的目的除了支持常规意义上的恶意软件行为分析,还有就是关注恶意软件检测和防范方法的发展。Malheur能够识别具有类似行为的恶意软件,还能够发现未知的恶意软件。Malheur支持检测报告自动生成,报告格式类似于流行的恶意软件沙箱CWSandbox,Anubis,Norman,Sandbox和joebox。-Malheur is an automated malware analysi
2
- Volume issue 2013 [doi 10.1145_2513228.2513294] K. Han J. H. Lim E. G. Im -- Malware analysis method using visualization of binary files.pdf- Volume issue 2013 [doi 10.1145_2513228.2513294] K. Han J. H. Lim E. G. Im -- Malware analysis method usin
RDG-Packer-Detector-v0.7.2-2014
- Universal packer detector for malware analysis
src
- a driver for Cuckoo Sandbox, it will perform kernel analysis during the execution of a malware. There are many ways for a malware author to bypass Cuckoo detection, he can detect the hooks, hardcodes the Nt* functions to avoid the hooks, detect the
BSidesAustin2015_MalwareAnalysis_NoGifs
- BSidesAustin2015 Malware Analysis
恶意软件分析系统
- 基于C#的恶意软件分析系统,主要处理恶意代码数据(C# based malware analysis system, mainly dealing with malicious code data)
Chapter 0-1
- Malware Analysis book is a guide to do reverse engineering malware
Chapter 2-3
- Malware Analysis book is a guide to do reverse engineering malware 2
Chapter 4-5
- Malware Analysis book is a guide to do reverse engineering malware 3
Chapter 6-7
- Malware Analysis book is a guide to do reverse engineering malware 4
Chapter 8-9
- Malware Analysis book is a guide to do reverse engineering malware 5
Chapter 10-11
- Malware Analysis book is a guide to do reverse engineering malware 6
Malware_Analysts_Cookbook.pdf
- Malware Analyst's Cookbook
malware_analysis-master
- ida assembly code for malware analysis