https://www.peerlyst.com/posts/how-to-build-a-linux-automated-malware-analysis-lab-chiheb-chebbi?fbclid=IwAR0A4xVM9-jBgla2jyu-qoTM8RBbCh32ibKRoipyjuTkJC7ukO42flVb7jM AbstractHi Peerlysters ! This article is going to be like a small guide to give you some glimpses, ideas and suggestions to learn how tobuild a Linux automated Analysis lab using built-in Linux commands, python and open source proje..
General SamplestheZoo theZoo is a project created to make the possibility of malware analysis open and available to the public.contagio Contagio is a collection of the latest malware samples, threats, observations, and analyses.Hybrid Analysis Free malware analysis service powered by Payload Security. Using this service you can submit files for in-depth static and dynamic analysis. You can also ..
https://www.endgame.com/blog/technical-blog/ten-process-injection-techniques-technical-survey-common-and-trending-process Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process. Process injection improves stealth, and some techniques also achieve persi..
https://www.peerlyst.com/posts/resource-learning-how-to-reverse-malware-a-guide Resource: Malware analysis - learning How To Reverse Malware: A collection of guides and toolsThis resource will provide you theory around learning malware analysis and reverse engineering malware. We keep the links up to date as the infosec community creates new and interesting tools and tips.Let me know if you have..