mirror of
https://github.com/nganhkhoa/malware.git
synced 2024-06-10 21:32:07 +07:00
Update malware-analysis_ref_and_memo.md
This commit is contained in:
parent
f3dc233392
commit
44831ddba4
@ -28,7 +28,7 @@ DFIR,マルウェア解析,OSINTに特化したUbuntuベースのディスト
|
|||||||
|[IDA pro](https://www.hex-rays.com/products/ida/)|〇|〇(Not free)<br>Snowman(plugin)|〇|[IDA Pro Reverse Engineering Tutorial for Beginners](https://www.youtube.com/playlist?list=PLKwUZp9HwWoDDBPvoapdbJ1rdofowT67z)|||||
|
|[IDA pro](https://www.hex-rays.com/products/ida/)|〇|〇(Not free)<br>Snowman(plugin)|〇|[IDA Pro Reverse Engineering Tutorial for Beginners](https://www.youtube.com/playlist?list=PLKwUZp9HwWoDDBPvoapdbJ1rdofowT67z)|||||
|
||||||
|[Binary Ninja](https://binary.ninja/)|〇||||||||
|
|[Binary Ninja](https://binary.ninja/)|〇||||||||
|
||||||
|[Cutter](https://github.com/radareorg/cutter)|〇|r2dec,r2ghidra|native<br>gdb<br>windbg<br>etc.|[INTRO TO CUTTER FOR MALWARE ANALYSIS(2019-03)](https://malwology.com/2019/03/14/intro-to-cutter-for-malware-analysis/)<br>[megabeets.net](https://www.megabeets.net/?s=cutter)<br>[Cutter: Presenting r2ghidra Decompiler,r2con 2019](https://www.youtube.com/watch?v=eHtMiezr7l8&list=LLTk6-mAiILdt3V27uab14LA&index=8&t=0s)|||||
|
|[Cutter](https://github.com/radareorg/cutter)|〇|r2dec,r2ghidra|native<br>gdb<br>windbg<br>etc.|[INTRO TO CUTTER FOR MALWARE ANALYSIS(2019-03)](https://malwology.com/2019/03/14/intro-to-cutter-for-malware-analysis/)<br>[megabeets.net](https://www.megabeets.net/?s=cutter)<br>[Cutter: Presenting r2ghidra Decompiler,r2con 2019](https://www.youtube.com/watch?v=eHtMiezr7l8&list=LLTk6-mAiILdt3V27uab14LA&index=8&t=0s)|||||
|
||||||
|[Ghidra](https://ghidra-sre.org/)|〇|〇||[Reversing WannaCry Part 2 - Diving into the malware with #Ghidra,youtube](https://www.youtube.com/watch?v=Q90uZS3taG0)<br>[cheetsheet](https://www.oldergeeks.com/downloads/file.php?id=2767)<br>[Scripting in Ghidra, Patching MacOS Image2Icon](https://duraki.github.io/posts/o/20200227-ghidra-scripting-image2icon.html)<br>[Intro to Reverse Engineering](https://medium.com/swlh/intro-to-reverse-engineering-45b38370384)<br>[Intro to Reverse Engineering, Part 2](https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9)<br>[ntro to Reverse Engineering with Ghidra](https://www.youtube.com/playlist?list=PL_tws4AXg7auglkFo6ZRoWGXnWL0FHAEi)|||||
|
|[Ghidra](https://ghidra-sre.org/)|〇|〇||[Reversing WannaCry Part 2 - Diving into the malware with #Ghidra,youtube](https://www.youtube.com/watch?v=Q90uZS3taG0)<br>[cheetsheet](https://www.oldergeeks.com/downloads/file.php?id=2767)<br>[Scripting in Ghidra, Patching MacOS Image2Icon](https://duraki.github.io/posts/o/20200227-ghidra-scripting-image2icon.html)<br>[Intro to Reverse Engineering](https://medium.com/swlh/intro-to-reverse-engineering-45b38370384)<br>[Intro to Reverse Engineering, Part 2](https://medium.com/swlh/intro-to-reverse-engineering-part-2-4087a70104e9)<br>[Intro to Reverse Engineering with Ghidra,youtube](https://www.youtube.com/playlist?list=PL_tws4AXg7auglkFo6ZRoWGXnWL0FHAEi)|||||
|
||||||
|[x64/x32dbg](https://x64dbg.com/#start)|〇|Snowman|〇||||||
|
|[x64/x32dbg](https://x64dbg.com/#start)|〇|Snowman|〇||||||
|
||||||
|[WinDbg](https://docs.microsoft.com/ja-jp/windows-hardware/drivers/debugger/debugger-download-tools)|〇||〇|[Memory Analysis Skillbuilder Series: Skeleton Key Deep Dive with WinDbg](https://www.youtube.com/watch?v=pdkOJMBmckQ&feature=youtu.be)<br>[WinDbg — the Fun Way: Part 2](https://medium.com/@yardenshafir2/windbg-the-fun-way-part-2-7a904cba5435)<br>[WinDbg Basics for Malware Analysis](https://www.youtube.com/watch?v=QuFJpH3My7A)|||||
|
|[WinDbg](https://docs.microsoft.com/ja-jp/windows-hardware/drivers/debugger/debugger-download-tools)|〇||〇|[Memory Analysis Skillbuilder Series: Skeleton Key Deep Dive with WinDbg](https://www.youtube.com/watch?v=pdkOJMBmckQ&feature=youtu.be)<br>[WinDbg — the Fun Way: Part 2](https://medium.com/@yardenshafir2/windbg-the-fun-way-part-2-7a904cba5435)<br>[WinDbg Basics for Malware Analysis](https://www.youtube.com/watch?v=QuFJpH3My7A)|||||
|
||||||
|GDB|〇||〇||||||
|
|GDB|〇||〇||||||
|
||||||
|
Loading…
Reference in New Issue
Block a user