├── LICENSE └── README.md /LICENSE: -------------------------------------------------------------------------------- 1 | MIT License 2 | 3 | Copyright (c) 2024 CIS Team 4 | 5 | Permission is hereby granted, free of charge, to any person obtaining a copy 6 | of this software and associated documentation files (the "Software"), to deal 7 | in the Software without restriction, including without limitation the rights 8 | to use, copy, modify, merge, publish, distribute, sublicense, and/or sell 9 | copies of the Software, and to permit persons to whom the Software is 10 | furnished to do so, subject to the following conditions: 11 | 12 | The above copyright notice and this permission notice shall be included in all 13 | copies or substantial portions of the Software. 14 | 15 | THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 16 | IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 17 | FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE 18 | AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER 19 | LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, 20 | OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE 21 | SOFTWARE. 22 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | 2 | # Malware-Analysis-Roadmap-2024 3 | 4 | 5 | ## 🔸 Facing the fear of begging: 6 | 7 | 8 | ### 🔷 ASSEMBLY: 9 | - 📕 The_art_of_assembly: [book](https://drive.google.com/file/d/1lcEdPw8yvyAXzzROBT9Za4qGhA-PdIL_/view?usp=sharing) 10 | - 📽️ Assembly: [Arch1001 | OpenSecurityTraining2 ](https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/about) 11 | 12 | 13 | ### 🔷Practical Analysis: 14 | 15 | - 📘 practical binary analysis: [PE_FORMAT_chapter_3_only](https://drive.google.com/file/d/1Dz0JE_pIk1F0U2J1-WMTZ-cRsBAxM53n/view?usp=sharing) 16 | - 📕 practical malware analysis: [book](https://drive.google.com/file/d/1r7h_oTnQ55oL0PhODjan-yAszEBY2laO/view?usp=sharing) 17 | - 📘 the_art_of_unpacking: [book](https://drive.google.com/file/d/1UT1TZWtxbCptBLa_JlsIi8lCuX7enurH/view?usp=sharing) 18 | 19 | 20 | ## 🔸 Facing the world: 21 | 22 | 23 | - 🌟 Zero-to-hero: [Roadmap-Resources] 24 | - 🌟 Zero-to-auto: [Roadmap-Resources] 25 | 26 | 27 | - 📽️ HuskyHacks: [video](https://www.youtube.com/watch?v=qA0YcYMRWyI) 28 | - ✍️ El khaser: [practice](https://github.com/LordNoteworthy/al-khaser) 29 | 30 | - 📽️ IcedID malware: [LINK](https://shorturl.at/bxBV6) then [LINK](https://shorturl.at/dUVW6) 31 | - 📽️ IRC botnet: [LINK](https://shorturl.at/cmr59) then [LINK](https://shorturl.at/bdhV8) 32 | - 📽️ Warzone RAT: [LINK](https://shorturl.at/prtw7) then [LINK](https://rb.gy/s646di) 33 | - 📽️ PE entry points: [LINK](https://rb.gy/lpap2c) 34 | - 📽️ Defeating API Hashing using HashDB: [LINK](https://rb.gy/m4kcmh) 35 | - 📽️ Guide for unpacking & unmapping: [LINK](https://rb.gy/lg995h) 36 | - 📽️ Malware Triage tips: [LINK](https://rb.gy/o5s39c) 37 | - 📽️ Unknown Malware Identification: [LINK](https://t.ly/g46BB) 38 | - 📽️ Plugins for IDA Pro: [LINK](https://t.ly/uTKbr) 39 | - 📽️ IDA Pro Scripting: [LINK](https://t.ly/7FaIp) 40 | 41 | 42 | 43 | 44 | - 🌟 windows internals: [Roadmap-Resources] 45 | - 📘 practical binary analysis: [book](https://drive.google.com/file/d/1Dz0JE_pIk1F0U2J1-WMTZ-cRsBAxM53n/view?usp=sharing) 46 | - 📘 Secrets of Reverse Engineering: [book](https://drive.google.com/file/d/1nX99VXYetkZhm3VpxvviNFl_qycNZcwU/view?usp=sharing) 47 | - 📘 Practical Reverse Engineering book: [book](https://drive.google.com/file/d/1y2y0ikNxvjhjbzBviYGkLFHf8Gj11hgT/view?usp=sharing) 48 | 49 | ## 🔰 Make your technical blog 🔰 50 | 51 | 52 | 53 | 54 | --------------------------------------------------------------------------------