Malware Analysis

Cheat Sheet for Analyzing Malicious Software
https://zeltser.com/reverse-malware-cheat-sheet/

5 Steps to Building a Malware Analysis Toolkit Using Free Tools
https://zeltser.com/build-malware-analysis-toolkit/

Several Posts on Malware Analysis Tools
https://zeltser.com/several-posts-on-malware-analysis-tools/

Tips on Malware Analysis from Jake Williams
https://zeltser.com/tips-on-malware-analysis-from-jake-williams/

How Malicious Code Can Run in Microsoft Office Documents
https://zeltser.com/malicious-code-inside-office-documents/

Free Automated Malware Analysis Sandboxes and Services
https://zeltser.com/automated-malware-analysis/

Malware Sample Sources for Researchers
https://zeltser.com/malware-sample-sources/

How Security Companies Assign Names to Malware Specimens
https://zeltser.com/malware-naming-approaches/

Extracting Malicious Flash Objects from PDFs Using SWF Mastah
https://zeltser.com/extracting-swf-from-pdf-using-swf-mastah/

How Antivirus Software Works: 4 Detection Techniques
https://zeltser.com/how-antivirus-software-works/

NetworkMiner for Analyzing Network Streams and Pcap Files
https://zeltser.com/networkminer-for-analyzing-network-traffic/

3 Free NirSoft Tools for Malware Analysis
https://zeltser.com/processactivitymonitor-and-regfromapp/

Process Monitor Filters for Malware Analysis and Forensics
https://zeltser.com/process-monitor-filters-for-malware-analysis/

How to Get into Digital Forensics or Security Incident Response
https://zeltser.com/how-do-get-into-forensics-or-incident-response/

Analyzing Suspicious PDF Files With PDF Stream Dumper
https://zeltser.com/pdf-stream-dumper-malicious-file-analysis/

Learning Malware Analysis Through Practice
https://zeltser.com/learning-malware-analysis-through-practice/

One-Click Windows Memory Acquisition with DumpIt
https://zeltser.com/memory-acquisition-with-dumpit-for-dfir-2/

Analyzing Suspicious PDF Files With Peepdf
https://zeltser.com/peepdf-malicious-pdf-analysis/

6 Free Local Tools for Analyzing Malicious PDF Files
https://zeltser.com/tools-for-malicious-pdf-analysis/

3 Tools to Scan the File System With Custom Malware Signatures
https://zeltser.com/custom-signatures-for-malware-scan/

Protect Files From Malware With Windows Integrity Levels
https://zeltser.com/windows-integrity-levels-malware-protection-files/

Protect Processes from Spyware With Windows Integrity Levels
https://zeltser.com/windows-integrity-levels-for-spyware-protection-processe/

Researching Malicious Websites: A Few Tips
https://zeltser.com/tips-for-researching-malicious-websites/

Introduction to Malware Analysis – Free Recorded Webcast
https://zeltser.com/malware-analysis-webcast/

Tips for Converting Shellcode to x86 Assembly
https://zeltser.com/convert-shellcode-to-assembly/

Analyzing Malicious Documents Cheat Sheet
https://zeltser.com/analyzing-malicious-documents/

Getting Started With Malware Analysis
https://zeltser.com/get-started-with-malware-analysis/

Mastering 4 Stages of Malware Analysis
https://zeltser.com/mastering-4-stages-of-malware-analysis/

Published by

sornram9254

Ayutthaya Technical College/Voc.Cert.🛠️ | KMUTNB/B.S.Tech.Ed.⚙️ | Information Security Engineer 👨🏻‍💻| Penetration Tester👨🏻‍💻 | COYG🔴 Milan🔴⚫️ | Taylor Swift👩‍🎤 | ติ่งซีรีส์ญี่ปุ่น 🇯🇵

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.