mirror of
https://github.com/rshipp/awesome-malware-analysis.git
synced 2024-10-01 06:35:40 -04:00
commit
f4403108f3
@ -449,6 +449,7 @@ the [browser malware](#browser-malware) section.*
|
||||
source Binary Analysis and Reverse engineering Framework.
|
||||
* [binnavi](https://github.com/google/binnavi) - Binary analysis IDE for
|
||||
reverse engineering based on graph visualization.
|
||||
* [Binary ninja](https://binary.ninja/) - A reversing engineering platform that is an alternative to IDA.
|
||||
* [Binwalk](http://binwalk.org/) - Firmware analysis tool.
|
||||
* [Bokken](http://www.bokken.re/) - GUI for Pyew and Radare.
|
||||
([mirror](https://github.com/inguma/bokken))
|
||||
@ -492,6 +493,7 @@ the [browser malware](#browser-malware) section.*
|
||||
files in more detail.
|
||||
* [Process Explorer](https://technet.microsoft.com/en-us/sysinternals/processexplorer.aspx) -
|
||||
Advanced task manager for Windows.
|
||||
* [Process Hacker] (http://processhacker.sourceforge.net/) - Tool that monitors system resources
|
||||
* [Process Monitor](https://technet.microsoft.com/en-us/sysinternals/bb896645.aspx) -
|
||||
Advanced monitoring tool for Windows programs.
|
||||
* [PSTools](https://technet.microsoft.com/en-us/sysinternals/pstools.aspx) - Windows
|
||||
@ -500,6 +502,7 @@ the [browser malware](#browser-malware) section.*
|
||||
analysis.
|
||||
* [Radare2](http://www.radare.org/r/) - Reverse engineering framework, with
|
||||
debugger support.
|
||||
* [RegShot](https://sourceforge.net/projects/regshot/) - Registry compare utility that compares snapshots.
|
||||
* [RetDec](https://retdec.com/) - Retargetable machine-code decompiler with an
|
||||
[online decompilation service](https://retdec.com/decompilation/) and
|
||||
[API](https://retdec.com/api/) that you can use in your tools.
|
||||
@ -644,6 +647,7 @@ the [browser malware](#browser-malware) section.*
|
||||
Tools and Techniques for Fighting Malicious Code.
|
||||
* [Practical Malware Analysis](https://amzn.com/dp/1593272901) - The Hands-On Guide
|
||||
to Dissecting Malicious Software.
|
||||
* [Practical Reverse Engineering](http://a.co/63SQsH2) - Intermediate Reverse Engineering
|
||||
* [Real Digital Forensics](https://www.amzn.com/dp/0321240693) - Computer Security and Incident Response
|
||||
* [The Art of Memory Forensics](https://amzn.com/dp/1118825098) - Detecting
|
||||
Malware and Threats in Windows, Linux, and Mac Memory.
|
||||
|
Loading…
Reference in New Issue
Block a user