mirror of
https://github.com/nganhkhoa/malware.git
synced 2024-06-10 21:32:07 +07:00
Update malware-analysis_ref_and_memo.md
This commit is contained in:
parent
e89642aa66
commit
0f52db99bb
@ -29,7 +29,7 @@ DFIR,マルウェア解析,OSINTに特化したUbuntuベースのディスト
|
|||||||
|
|
||||||
|name|plugin|price|platform|remarks|
|
|name|plugin|price|platform|remarks|
|
||||||
|:-|:-|:-|:-|:-|
|
|:-|:-|:-|:-|:-|
|
||||||
|IDA pro|[Lighthouse](https://github.com/gaasedelen/lighthouse)<br>[UEFI_RETool](https://github.com/yeggor/UEFI_RETool/tree/master/ida_plugin)|Not free|multi||||||
|
|IDA pro|[Lighthouse](https://github.com/gaasedelen/lighthouse)<br>[UEFI_RETool](https://github.com/yeggor/UEFI_RETool/tree/master/ida_plugin)<br>[VT-IDA Plugin](https://github.com/VirusTotal/vt-ida-plugin)|Not free|multi||||||
|
||||||
|Binary Ninja|[Lighthouse](https://github.com/gaasedelen/lighthouse)|Not free|||||||
|
|Binary Ninja|[Lighthouse](https://github.com/gaasedelen/lighthouse)|Not free|||||||
|
||||||
|Cutter|[CutterDRcov](https://github.com/oddcoder/CutterDRcov)<br>[Jupyter Plugin for Cutter](https://github.com/radareorg/cutter-jupyter)<br>[x64dbgcutter](https://github.com/yossizap/x64dbgcutter)<br>[etc.](https://github.com/radareorg/cutter-plugins)|free|multi||||||
|
|Cutter|[CutterDRcov](https://github.com/oddcoder/CutterDRcov)<br>[Jupyter Plugin for Cutter](https://github.com/radareorg/cutter-jupyter)<br>[x64dbgcutter](https://github.com/yossizap/x64dbgcutter)<br>[etc.](https://github.com/radareorg/cutter-plugins)|free|multi||||||
|
||||||
|Ghidra|[pwndra](https://github.com/0xb0bb/pwndra)<br>[ghidra_scripts](https://github.com/alephsecurity/general-research-tools/tree/master/ghidra_scripts)<br>[OOAnalyzer](https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html)|free|multi||||||
|
|Ghidra|[pwndra](https://github.com/0xb0bb/pwndra)<br>[ghidra_scripts](https://github.com/alephsecurity/general-research-tools/tree/master/ghidra_scripts)<br>[OOAnalyzer](https://insights.sei.cmu.edu/sei_blog/2019/07/using-ooanalyzer-to-reverse-engineer-object-oriented-code-with-ghidra.html)|free|multi||||||
|
||||||
@ -304,7 +304,7 @@ to do...
|
|||||||
|
|
||||||
# Training Material
|
# Training Material
|
||||||
- [Malware-Traffic-Analysis(TRAFFIC ANALYSIS EXERCISES)](https://www.malware-traffic-analysis.net/training-exercises.html)<br>
|
- [Malware-Traffic-Analysis(TRAFFIC ANALYSIS EXERCISES)](https://www.malware-traffic-analysis.net/training-exercises.html)<br>
|
||||||
- pcap解析(マルウェア感染等のセキュリティインシデントに関わるトラフィック解析)に関するトレVT-IDA Pluginーニング教材<br>
|
- pcap解析(マルウェア感染等のセキュリティインシデントに関わるトラフィック解析)に関するトレーニング教材<br>
|
||||||
- [Malware-Analysis-Training](https://github.com/OpenRCE/Malware-Analysis-Training)<br>
|
- [Malware-Analysis-Training](https://github.com/OpenRCE/Malware-Analysis-Training)<br>
|
||||||
- 初心者/中級者向けのマルウェア解析トレーニング教材<br>
|
- 初心者/中級者向けのマルウェア解析トレーニング教材<br>
|
||||||
- 教材自体は2010年頃のもので2020年にオープンソース化
|
- 教材自体は2010年頃のもので2020年にオープンソース化
|
||||||
|
Loading…
Reference in New Issue
Block a user