Malware Repo

Talk on Malware

Malware Tracking at Scale | Wrangle Conference 2016

Session 12 – Case Study: Rootkit Analysis

Cyber Security With Amit Malik – Episode 1 – Macro Analysis

Blog Post

Part 1: Introduction and De-Obfuscating and Reversing the User-Mode Agent Dropper

Part 2: Reverse Engineering the Kernel-Mode Device Driver Stealth Rootkit

Part 3: Reverse Engineering the Kernel-Mode Device Driver Process Injection Rootkit

Part 4:Tracing the Crimeware Origins by Reversing the Injected Code

Getting Started With Malware Analysis

Free Toolkits for Automating Malware Analysis

Mastering 4 Stages of Malware Analysis

My Malware Analysis Setup

The Usefulness of Strings During Static Malware Analysis (part 1)

The Usefulness of Strings During Static Malware Analysis (part 2)

The Usefulness of Strings During Static Malware Analysis (part 3)

Malware with No Strings Attached Part 1 – Dynamic Analysis

How To Build An Effective Malware Analysis Sandbox