A repository dedicated to researching, analyzing, documenting, and ultimately, defending against various strains of malicious software and their behaviors.
git clone https://github.com/0xvpr/Malicious-Software-Research
cd Malicious-Software-Research
chmod +x build-image.sh run-image.sh
./build-image.sh
./run-image.sh
- Shellcode Crafting
- Storage Techniques
- Injection Techniques
- Obfuscation Techniques
- Ransomware
- Evasion
- Living Off The Land
- Socket
- Keyloggers
- Droppers
- Hooking Techniques
- Reversing C++ Classes and Structures
- Reflective DLL Injection
- Executing Position Independent Shellcode from Object Files in Memory
- Shellcode Crafting
- Getting Familiar with Sockets
- Anti Dynamic Analysis & Sandboxes
- Anti Debugging
- Anti Static Analysis Tricks
- Educational Use Only: All examples and code herein are for educational and research purposes only.
- No Warranty: The repository is provided “as is”, without warranty of any kind, express or implied.
- Legal Responsibility: You are solely responsible for ensuring that your use of these materials complies with all applicable laws and regulations.
If you have any doubts regarding the legality or ethics of using these examples, do not proceed.
This repository is released under the MIT License. In short:
- You are free to use, modify, and distribute this code for personal or commercial purposes.
- Please include credit where credit is due.
- The authors/contributors are not liable for any misuse or damage caused by this code.