文章目录
- info-gathering
- TI威胁情报
- Analyzing Malicious Password Protected Office Documents
- Hack
- 恶意软件分析大合集
- LifeOfBinarie
- PNG Payload
- Malware Sample Source
- Malware Analyst
- Malware分析文章
- 恶意样本分析
- Resources for Learning Reverse Engineering
- 病毒分类
- 在线检测恶意软件网站
- 用命令行与Python使用YARA规则-识别恶意木马必备
- ida视频
- 恶意样本分析
- Malware Sample Sources for Researchers
- List of Malware Sources
- WMI BackDoor
- IDA
- malware analysis labs
- Exploitation Archives
- Exploits
- VMP/TMD Unpack
- MIPS 路由器木马
- 勒索软件信息
- Linux Kernel Debug
- PowerShell
- Limon Sandbox For Analyzing Linux Malwares
- Advanced Malware Analysis
- WMI POWERSHELL 挖矿
- CTF
- CoinMiner
- NET Malware
- URL
- Yara
- 教你构建自己的yara数据库
- 基础反调试技术总结
- ARM Exploit
- 勒索软件分析报告
- Docker分析文章
- Android 加固分析
- MalwareVbr
- JS混淆
- BitCode
- Processon
- RTFOBJ
- Python
- Linux Malware Analyst
- Window Payload
- PowerShell
- PART 2A: INTRO TO THREAT HUNTING WITH KOLIDE FLEET, OSQUERY, POWERSHELL EMPIRE, AND CALDERA – SETUP ENVIRONMENT
- R2
- Proxmox & Cuckoo
- 威胁情报网站
- 恶意流量分析网站
- 安全网站
- ML Malware
- 看雪知识库
- NET逆向
- 虚拟机检测技术攻防
- x86_64 Reverse-Engineering
- Unpacking Shade Ransomware
- DDoS
- Android So
- VMWare
- MalwareCookBook
- Malware Analyst Research Toolkit
- SSMA - Simple Static Malware Analyzer
- Malicious traffic detection system
- Collection of android malware samples - Android Samples
- Malware Source
- List of awesome malware analysis tools and resources
- A collection of OSX and iOS security resources
- Malware
- ARM Emulate
- Static and automated/dynamic malware analysis
- Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
- Malware Classifier From Network Captures
- Collection of scripts for different malware analysis tasks
- POC Android Malware Ransomware/Recon
- Repository containing Yara rules, indicators and tools from PhishMe Research
- Binaries for the book Practical Malware Analysis
- Android Malware
- Malware Behavior Analyzer
- Debian packaging of Linux Malware Detect
- Scanning and identifying XOR encrypted PE files in PE resources
- Windows Malware Rootkit
- Malware static analysis framework
- Harmless Android malware using the overlay technique to steal user credentials.
- My personal Automated Malware Analysis Sandboxes and Services
- Collection of almost 40.000 javascript malware samples
- Code for Deep Android Malware Detection paper
- Various scripts for different malware families
- iOS malware samples
- An Android Eclipse project demonstrating how to build a simple anti-malware application
- VMWare
- Windows Resource Download
- Vulnhub
- Windbg XP
- 360报告
- Ransomware
- IoT 门锁
- VirtualKD
- OFFICE MALWARE/EXPLOIT
- Linux x86 Exploit
- Malware Samples
- Free Automated Malware Analysis Sandboxes and Services
- Free Online Tools for Looking up Potentially Malicious Websites
- APT Sample
- CVE
- malware source
- auto script
- Course Book
- AntiMalware Software
- Samples
- APT
- Tools
- 在线画图工具
- 脱壳逆向
info-gathering
资产测绘,威胁情报中心
资产测绘平台
-
Fofa:https://fofa.info
-
奇安信鹰图:https://hunter.qianxin.com/
-
零零信安:https://0.zone
-
Quake:https://quake.360.net/
-
Shodan:https://www.shodan.io/
-
微步测绘:https://x.threatbook.com/v5/mapping
-
谛听:https://www.ditecting.com/
-
Zoomeye:https://www.zoomeye.org/
-
Censys:https://search.censys.io/
-
SecurityTrails (https://securitytrails.com/)
SecurityTrails(前身为 DNS Trails)拥有大约3.5万亿DNS记录,3