🔎
CyberSleuth Chronicles
ArchiveAbout UsResources
  • Welcome
  • 👋About Us
  • 📖Archive
  • 🔍The Unicorn, the OG, and the Academy
  • 🔓Open-Source Certified (OSC): Shaping the Future of OSINT Through Certification
  • 🔎Practical Junior OSINT Researcher (PJOR) : A Practical Review for a Practical Cert
  • 🕰️OSINT Week 2024
  • 🕰️OSINT Week CTF (May 2024)
  • 🕰️OSINT Week Answer Key
  • 🐻Analyzing APT 29 (NOBELIUM aka Cozy-Bear) – Part 1
  • 🐻Analyzing APT 29 (NOBELIUM aka Cozy-Bear) – Part 2
  • 👷Securing the Inbox
  • 🐦Serving up AD Decoy accounts to Responder
  • 📚Building a Detection Engineering Home-lab
  • 👷‍♂️Social Engineering TTPs Episode 2: Malicious Job Advertisements
  • 👷‍♂️Social Engineering TTPs Episode 1: Smishing with 2FA Spoofing
  • 📞Informational Interviews
  • 💾Resources
    • ☕Useful Resource for Everyone!
    • 👾Malware and Reverse Engineering Resources
Powered by GitBook
On this page
  • *Disclaimer: These resources are for your educational pursuits in learning Malware Analysis and Reverse Engineering. It is highly discouraged to use these resources for anything other than educational pursuits and the author is not liable for what you do in your own time.... so be good.*
  • Malware Analysis Certifications
  • Malware Analysis and Reverse Engineering Training
  • Books:
  • Blogs:
  • Malware/RE Practice Ranges
  • Tools
  • Security Research Groups Within Companies:
  1. Resources

Malware and Reverse Engineering Resources

A compiled list of resources, certifications, and training to help you on your Malware Analysis and Reverse Engineering Journey

Last updated 1 year ago

*Disclaimer: These resources are for your educational pursuits in learning Malware Analysis and Reverse Engineering. It is highly discouraged to use these resources for anything other than educational pursuits and the author is not liable for what you do in your own time.... so be good.*

Malware Analysis Certifications

  1. (GREM) Giac Reverse Engineering and Malware by SANS

  2. (PJMR) Practical Junior Malware Researcher by TCM Security

Malware Analysis and Reverse Engineering Training

  1. FOR610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques

  2. FOR710: Reverse-Engineering Malware: Advanced Code Analysis

  3. Cracking Lessons (CSL/CSP/MDV1/MDV2)

  4. Practical Malware Analysis and Triage

  5. Ultimate Malware Analysis by Zero2Automated

  6. OALabs RE101/201/504

  7. Malware Analysis Fundamentals by Let's Defend

  8. CS6038/CS5138 Malware Analysis

  9. Malware Analysis CSCI 4976 by RPISEC

  10. Reverse Engineering 101/102 by Malware Unicorn

  11. Mandiant:

  12. $$

  13. $$$$

Books:

Blogs:

RE Microsoft Defender

Malware/RE Practice Ranges

  1. RE malware source code and samples (VXUnderground)

  2. Malware Zoo with a large collection of malware in a single python database

  3. Flare-On CTF collections

Tools

  1. Binary Ninja

Security Research Groups Within Companies:

Tyto athene

Cisco Talos

Palo Alto Unit42

Mandiant

CrowdStrike

Carbon Black

Google project zero

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Malware Analysis Detection Engineering

Malware Analyst’s Cookbook

Reversing: Secrets of Reverse Engineering

(Threat Intel Book) Operationalizing Threat Intelligence

- really good malware blogs

—Author of GREM (Great blog)

Flare-VM

💾
👾
https://www.giac.org/certifications/reverse-engineering-malware-grem/
https://certifications.tcm-sec.com/pjmr/
https://www.sans.org/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques/
https://www.sans.org/cyber-security-courses/reverse-engineering-malware-advanced-code-analysis/
https://www.crackinglessons.com
https://academy.tcm-sec.com/p/practical-malware-analysis-triage
https://lnkd.in/dN7v2zNj
https://www.patreon.com/oalabs
https://github.com/OALabs/Lab-Notes
https://github.com/OALabs/research
https://research.openanalysis.net/
https://lnkd.in/dSDUeyP7
https://class.malware.re/
https://github.com/RPISEC/Malware
https://malwareunicorn.org/workshops/re101.html#0
https://malwareunicorn.org/workshops/re102.html#0
Essentials of Malware Analysis
Malware Analysis Fundamentals
Malware Analysis Crash Course
Malicious Documents Analysis
Advanced Red Teaming Techniques: Malware Authoring and Repurposing
Malware Analysis Master Course
https://vimeo.com/30076325
https://vimeo.com/30594548
https://youtu.be/Pg8bmV9vcKg
https://malwareunicorn.org/workshops/re101.html#0
https://malwareunicorn.org/workshops/re102.html#0
https://github.com/cspinstructor/github-crackmes
https://signal-labs.com/self-paced-trainings/
https://www.reverse-engineer.net/
https://www.maldevacademy.com/
https://lnkd.in/dmyhKDBV
https://www.amazon.com/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901
https://www.amazon.com/Malware-Analysis-Detection-Engineering-Comprehensive/dp/1484261925
https://www.amazon.com/Malware-Analysts-Cookbook-DVD-Techniques/dp/0470613033
https://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817
https://www.amazon.com/Operationalizing-Threat-Intelligence-operationalizing-intelligence/dp/1801814686
https://n1ght-w0lf.github.io/
https://farghlymal.github.io/
https://dr4k0nia.github.io/
https://t.co/b2pPNUs5tc
https://t.co/0MmaO0sits
https://t.co/FWLPHDgLAJ
https://forensicitguy.github.io/
https://squiblydoo.blog/blog/
https://blog.bushidotoken.net/
https://t.co/Foaierv2hu
https://t.co/f6I7ZPWGM7
https://protectedmo.de/brute.html
https://t.co/Z6AlMCeCzS
https://t.co/i4OjTGjLcL
https://russianpanda.com/2023/06/28/Meduza-Stealer-or-The-Return-of-The-Infamous-Aurora-Stealer/
https://exploitreversing.com/
http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html?m=1
https://cyb3rkitties.github.io/posts/malware-analysis-reverse-engineering-beginner-study-plan/
https://squiblydoo.blog/2023/06/05/understanding-pe-bloat-with-malcat/
https://legend.octopuslabs.io/sample-page.html
https://gitlab.com/39iosdev/ccd-iqt/idf/C-Programming
https://vxug.fakedoma.in/
https://github.com/guyinatuxedo/nightmare
https://zeltser.com/malicious-software/
https://github.com/0xAlexei/WindowsDefenderTools
RECON-BRX-2018-Reverse-Engineering-Windows-Defender-s-JavaScript-Engine.pdf
us-18-Bulazel-Windows-Offender-Reverse-Engineering-Windows-Defenders-Antivirus-Emulator.pdf
https://github.com/vxunderground/MalwareSourceCode
https://github.com/vxunderground/VX-API
https://github.com/ytisf/theZoo
https://malwiki.org/index.php
https://flare-on.com/
https://cyberdefenders.org/
https://malcat.fr/
https://github.com/mandiant/flare-vm
https://binary.ninja/