Cheat Sheet for Analyzing Malicious Software
https://zeltser.com/reverse-malware-cheat-sheet/
5 Steps to Building a Malware Analysis Toolkit Using Free Tools
https://zeltser.com/build-malware-analysis-toolkit/
Several Posts on Malware Analysis Tools
https://zeltser.com/several-posts-on-malware-analysis-tools/
Tips on Malware Analysis from Jake Williams
https://zeltser.com/tips-on-malware-analysis-from-jake-williams/
How Malicious Code Can Run in Microsoft Office Documents
https://zeltser.com/malicious-code-inside-office-documents/
Free Automated Malware Analysis Sandboxes and Services
https://zeltser.com/automated-malware-analysis/
Malware Sample Sources for Researchers
https://zeltser.com/malware-sample-sources/
How Security Companies Assign Names to Malware Specimens
https://zeltser.com/malware-naming-approaches/
Extracting Malicious Flash Objects from PDFs Using SWF Mastah
https://zeltser.com/extracting-swf-from-pdf-using-swf-mastah/
How Antivirus Software Works: 4 Detection Techniques
https://zeltser.com/how-antivirus-software-works/
NetworkMiner for Analyzing Network Streams and Pcap Files
https://zeltser.com/networkminer-for-analyzing-network-traffic/
3 Free NirSoft Tools for Malware Analysis
https://zeltser.com/processactivitymonitor-and-regfromapp/
Process Monitor Filters for Malware Analysis and Forensics
https://zeltser.com/process-monitor-filters-for-malware-analysis/
How to Get into Digital Forensics or Security Incident Response
https://zeltser.com/how-do-get-into-forensics-or-incident-response/
Analyzing Suspicious PDF Files With PDF Stream Dumper
https://zeltser.com/pdf-stream-dumper-malicious-file-analysis/
Learning Malware Analysis Through Practice
https://zeltser.com/learning-malware-analysis-through-practice/
One-Click Windows Memory Acquisition with DumpIt
https://zeltser.com/memory-acquisition-with-dumpit-for-dfir-2/
Analyzing Suspicious PDF Files With Peepdf
https://zeltser.com/peepdf-malicious-pdf-analysis/
6 Free Local Tools for Analyzing Malicious PDF Files
https://zeltser.com/tools-for-malicious-pdf-analysis/
3 Tools to Scan the File System With Custom Malware Signatures
https://zeltser.com/custom-signatures-for-malware-scan/
Protect Files From Malware With Windows Integrity Levels
https://zeltser.com/windows-integrity-levels-malware-protection-files/
Protect Processes from Spyware With Windows Integrity Levels
https://zeltser.com/windows-integrity-levels-for-spyware-protection-processe/
Researching Malicious Websites: A Few Tips
https://zeltser.com/tips-for-researching-malicious-websites/
Introduction to Malware Analysis – Free Recorded Webcast
https://zeltser.com/malware-analysis-webcast/
Tips for Converting Shellcode to x86 Assembly
https://zeltser.com/convert-shellcode-to-assembly/
Analyzing Malicious Documents Cheat Sheet
https://zeltser.com/analyzing-malicious-documents/
Getting Started With Malware Analysis
https://zeltser.com/get-started-with-malware-analysis/
Mastering 4 Stages of Malware Analysis
https://zeltser.com/mastering-4-stages-of-malware-analysis/
Published by