Favorite Tools
- A list of my favorite tools. The list will grow over time.
 
Distros:
- Flare VM - https://github.com/mandiant/flare-vm
 - REMnux - https://remnux.org/
 - Kali Purple - https://www.kali.org/
 
Basic Static Analysis:
- VirusTotal - https://virustotal.com
 - any.run - https://any.run
 - FLOSS - https://github.com/mandiant/flare-floss
 - stringsifter - https://github.com/mandiant/stringsifter
 - ftrace
 - strace
 - PEStudio - https://www.winitor.com/
 - peframe
 - DIE (Detect It Easy)
 - ExeInfo
 - PEView - http://wjradburn.com/software/
 - pdfid - https://github.com/DidierStevens/DidierStevensSuite/blob/master/pdfid.py
 - pdf-parser - https://github.com/DidierStevens/DidierStevensSuite/blob/master/pdf-parser.py
 - CyberChef - https://gchq.github.io/CyberChef/
 - 010 Editor - https://www.sweetscape.com/010editor/
 
FLARE-VM/REMnux Tool List
- FLARE-VM
- strings/FLOSS: https://github.com/mandiant/flare-floss
 - PEView: http://wjradburn.com/software/
 - upx (not used but referenced): https://upx.github.io/
 - PEStudio: https://www.winitor.com/download
 - Capa: https://github.com/mandiant/capa
 - Wireshark: https://www.wireshark.org/
 - Sysinternals (Procmon, TCPView): https://learn.microsoft.com/en-us/sysinternals/downloads/
 - nc/ncat: https://nmap.org/download
 - Cutter: https://github.com/rizinorg/cutter
 - x32/x64dbg: https://x64dbg.com/
 - Process Hacker 2 (now known as System Informer): https://systeminformer.sourceforge.io/
 - scdbg: https://github.com/dzzie/SCDBG
 - dnSpy/dnSpyEx: https://github.com/dnSpyEx/dnSpy
 - PEBear: https://hshrzd.wordpress.com/pe-bear/
 - YARA: https://github.com/VirusTotal/yara
 
 - REMnux
- base64 (built in Linux bin)
 - OLEdump: https://github.com/DidierStevens/DidierStevensSuite/blob/master/oledump.py
 - MobSF (Docker Container): https://github.com/MobSF/Mobile-Security-Framework-MobSF | https://hub.docker.com/r/opensecurity/mobile-security-framework-mobsf/
 - INetSim: https://www.inetsim.org/
 
 
Advanced Static Analysis:
- [[Ghidra]] - https://github.com/NationalSecurityAgency/ghidra
 - Cutter - https://cutter.re/
 - IDA - https://hex-rays.com/ida-free/
 - dnSpy - dot NET
 - Binwalk
 
Emulators
- Speakeasy
 - [[Capa]] - https://github.com/mandiant/capa
 - binee
 - Qiling
 - Vivisect
 
Dynamic Analysis
- Wireshark
 - Inetsim
 - fakedns
 - accept-all-ips
 - Netcat
 - TCPView
 - Procmon
 - procdot
 - RegShot
 - Process Hacker
 - CMDWatcher
 - Fiddler Classic
 
Advanced Dynamic Analysis
- x86dbg
 - x64dbg
 - API Monitor
 
MAL API - https://malapi.io/#
Forensic Tools
- AXIOM Cyber - https://www.magnetforensics.com/products/magnet-axiom-cyber
 - KAPE - https://www.kroll.com/en/services/cyber-risk/incident-response-litigation-support/kroll-artifact-parser-extractor-kape
 - All things Eric Zimmerman - https://ericzimmerman.github.io/#!index.md
 - FTK Imager
 - Win Prefetch View
 - Arsenal Image Mounter
 - exiftool
 - PhotoRec
 
Recon/Intel Gathering
- dirhunt - https://github.com/Nekmo/dirhunt
 
Helpful Links
- Malicious APIs - https://malapi.io/
 - Malware Class- https://class.malware.re/
 - Windows Builds - https://uupdump.net/
 
Malware
- vxunderground - https://github.com/vxunderground/MalwareSourceCode
 - theZoo - https://github.com/ytisf/theZoo
 
Greatness Borrowed
- The list below was copied from https://github.com/0x4143/malware-gems.
 - All credit from here down goes to them.
 - No need to recreate something that already exists and is great.
 
Books:
- Intelligence Driven Incident Response - http://shop.oreilly.com/product/0636920043614.do
 - Practical Malware Analysis - https://www.nostarch.com/malware
 - Reversing: Secrets of Reverse Engineering - http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0764574817.html
 - Practical Reverse Engineering - http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118787315,subjectCd-CSJ0.html
 - Malware Analyst Cookbook - http://eu.wiley.com/WileyCDA/WileyTitle/productCd-0470613033.html
 - IDA Pro Book - https://www.nostarch.com/idapro2.htm
 - Art of Assembly - http://www.plantation-productions.com/Webster/www.artofasm.com/index.html
 - The Art of Memory Forensics - http://eu.wiley.com/WileyCDA/WileyTitle/productCd-1118825098.html
 - Windows Internals, Part 1 (6th Edition) - https://www.microsoftpressstore.com/store/windows-internals-part-1-9780735648739
 - Windows Internals, Part 2 (6th Edition) - https://www.microsoftpressstore.com/store/windows-internals-part-2-9780735665873
 - Windows Internals, Part 1 (7th Edition): https://www.microsoftpressstore.com/store/windows-internals-part-1-system-architecture-processes-9780735684188
 - Windows Internals, Part 2 (7th Edition): https://www.microsoftpressstore.com/store/windows-internals-part-2-9780135462409
 - Hacking. The Art of Exploitation - https://www.nostarch.com/hacking2.htm
 - The Shellcoder's Handbook: Discovering and Exploiting Security Holes - http://eu.wiley.com/WileyCDA/WileyTitle/productCd-047008023X.html
 - Rootkits: Subverting the Windows Kernel - https://dl.acm.org/citation.cfm?id=1076346
 - Rootkits and Bootkits - https://www.nostarch.com/rootkits
 - The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage - http://www.simonandschuster.com/books/The-Cuckoos-Egg/Cliff-Stoll/9781416507789
 - Rootkits: Subverting the Windows Kernel - https://dl.acm.org/citation.cfm?id=1076346
 - The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System - https://www.safaribooksonline.com/library/view/the-rootkit-arsenal/9781449626365/
 - Learning Malware Analysis - https://www.amazon.co.uk/Learning-Malware-Analysis-techniques-investigate/dp/1788392507/ref=sr_1_1?ie=UTF8&qid=1534162748&sr=8-1&keywords=malware+analysis
 - Sandworm - https://www.penguinrandomhouse.com/books/597684/sandworm-by-andy-greenberg/
 
CheatSheets/Tables:
- IDA Cheat Sheet - https://securedorg.github.io/idacheatsheet.html
 - Cheat Sheets - https://highon.coffee/blog/cheat-sheet/
 - File Signatures - http://www.garykessler.net/library/file_sigs.html
 - APT Groups and Operations - https://docs.google.com/spreadsheets/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/pubhtml#
 - Ransomware Overview - https://docs.google.com/spreadsheets/d/1TWS238xacAto-fLKh1n5uTsdijWdCEsGIM0Y0Hvmc5g/pubhtml#
 - Intel Assembler code table - http://www.jegerlehner.ch/intel/
 - ARM Assembly Cheatsheet - https://azeria-labs.com/assembly-basics-cheatsheet/
 - APTnotes - https://github.com/kbandla/APTnotes
 - PE 101 - https://github.com/corkami/pics/blob/master/binary/pe101/pe101.pdf
 - PDF 101 - https://github.com/corkami/docs/blob/master/PDF/PDF.md
 - PDF analysis - https://github.com/zbetcheckin/PDF_analysis
 - Digital Forensics and Incident Response - https://www.jaiminton.com/cheatsheet/DFIR/#
 
CTF's:
- Flare-On - http://flare-on.com/
 - LabyREnth - https://labyrenth.com/mud/
 - Facebook CTF - https://github.com/facebook/fbctf
 - CTF Field Guide - https://trailofbits.github.io/ctf/
 - RootMe - https://www.root-me.org
 - RPISEC CSCI 4968 - http://security.cs.rpi.edu/courses/binexp-spring2015/
 - Crackmes - https://crackmes.one/
 
Decoders:
- CyberChef - https://gchq.github.io/CyberChef/
 - KevtheHermit RAT decoders - https://github.com/kevthehermit/RATDecoders
 
Debuggers:
- OllyDbg - http://www.ollydbg.de/
 - Immunity Debugger - https://www.immunityinc.com/products/debugger/
 - X64dbg - https://x64dbg.com/#start
 - Rvmi - https://github.com/fireeye/rvmi
 - WinDBG - https://docs.microsoft.com/en-gb/windows-hardware/drivers/debugger/debugger-download-tools
 
Disassemblers:
- IDA Pro - https://www.hex-rays.com/products/ida/
 - Binary Ninja - https://binary.ninja/
 - Radare2 - https://github.com/radare/radare2
 - Cutter - https://github.com/radareorg/cutter
 - BinNavi - https://github.com/google/binnavi
 - Hopper - https://www.hopperapp.com/
 - medusa - https://github.com/wisk/medusa
 - Disassembler.io - https://www.onlinedisassembler.com/static/home/
 - Ghidra - https://ghidra-sre.org/
 
Document Analysis Tools:
- OfficeMalScanner/DisView - http://www.reconstructor.org/
 - AnalyzePDF - https://github.com/hiddenillusion/AnalyzePDF
 - BiffView - https://www.aldeid.com/wiki/BiffView
 - oletools - https://www.decalage.info/python/oletools
 - Origami Framework - https://github.com/cogent/origami-pdf
 - PDF Stream Dumper - http://sandsprite.com/blogs/index.php?uid=7&pid=57
 - CERMINE - https://github.com/CeON/CERMINE
 - pdfid - https://blog.didierstevens.com/programs/pdf-tools/
 - PDFwalker - https://www.aldeid.com/wiki/Origami/pdfwalker
 - Peepdf - http://eternal-todo.com/tools/peepdf-pdf-analysis-tool
 - pev - http://pev.sourceforge.net/
 - FOCA - https://www.elevenpaths.com/labstools/foca/index.html
 - LuckyStrike - https://github.com/curi0usJack/luckystrike
 - RTF Cleaner - https://github.com/nicpenning/RTF-Cleaner
 - RTFScan - http://www.reconstructer.org/
 
Dynamic/Behavioural Analysis Tools:
- CaptureBAT - https://www.honeynet.org/node/315
 - Sysinternals Suite - https://docs.microsoft.com/en-us/sysinternals/downloads/sysinternals-suite
 - ProcDOT - http://www.procdot.com/
 - Process Hacker - http://processhacker.sourceforge.net/
 - Sysmon - https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon
 - API Monitor - http://www.rohitab.com/apimonitor
 - Regshot - https://sourceforge.net/projects/regshot/
 - SwiftonSecurity Sysmon Config - https://github.com/SwiftOnSecurity/sysmon-config
 - Capture-Py - https://github.com/fbruzzaniti/Capture-Py
 - Windows Kernel Explorer - https://github.com/AxtMueller/Windows-Kernel-Explorer
 
Funny/Random:
- Win95 defrag - http://hultbergs.org/defrag/
 - Little Bobby - http://www.littlebobbycomic.com/
 - Dilbert - http://dilbert.com/
 - XKCD - https://xkcd.com/
 - Why the fuck was i breached - https://whythefuckwasibreached.com/
 - VIM Adventures - https://vim-adventures.com/
 
Honeypots:
- Modern Honey Network - https://github.com/threatstream/mhn
 
ICS:
- Graphical Realism Framework for Industrial Control Simulations - https://github.com/djformby/GRFICS
 - ꓘamerka - https://woj-ciech.github.io/kamerka-demo/kamerka.html
 
IDA:
- stackstring_static.py - https://github.com/TakahiroHaruyama/ida_haru/tree/master/stackstring_static
 - emotet_payload_decryption.py - https://gist.github.com/levwu/23751fe47f83d42ed6a63280a4f2aaaa
 - VB IDC - https://www.hex-rays.com/products/ida/support/freefiles/vb.idc
 - Diaphora - https://github.com/joxeankoret/diaphora
 - BinDiff - https://www.zynamics.com/bindiff.html
 - fnfuzzy - https://github.com/TakahiroHaruyama/ida_haru/tree/master/fn_fuzzy
 - BinDiff wrapper - https://github.com/TakahiroHaruyama/ida_haru/tree/master/bindiff
 - simpliFiRE.IDAscope - https://bitbucket.org/daniel_plohmann/simplifire.idascope/src/master/
 - IDA Plugins - http://www.openrce.org/downloads/browse/IDA_Plugins
 - FindCrypt - https://github.com/you0708/ida/tree/master/idapython_tools/findcrypt
 
IOT:
- Binwalk - https://github.com/devttys0/binwalk
 - JTAG Explained - http://blog.senr.io/blog/jtag-explained
 - Firmware Analysis Toolkit - https://github.com/attify/firmware-analysis-toolkit
 - Saleae Logic Analyzer software - https://www.saleae.com/downloads/
 
IR:
- Detecting Lateral Movement through Tracking Event Logs - https://www.jpcert.or.jp/english/pub/sr/20170612ac-ir_research_en.pdf
 - Incident Response Methodologies - https://github.com/certsocietegenerale/IRM
 - MITRE ATT&CK Framework - https://attack.mitre.org/wiki/Main_Page
 
JavaScript Deobfuscation Tools:
- SpiderMonkey (js) - https://blog.didierstevens.com/programs/spidermonkey/
 - Malzilla - http://malzilla.sourceforge.net/
 - Malware-Jail - https://github.com/HynekPetrak/malware-jail
 
LNK File Analysis:
MAC:
- MacOS Papers, Slides and Thesis Archive - https://papers.put.as/macosx/macosx/
 - norimaci - https://github.com/mnrkbys/norimaci
 - DTrace: [even better than] strace for OS X - https://8thlight.com/blog/colin-jones/2015/11/06/dtrace-even-better-than-strace-for-osx.html
 
Malware Repo's:
- MalwareBazaar - https://bazaar.abuse.ch/
 - VXVault - http://vxvault.net/ViriList.php
 - MalShare - https://malshare.com/
 - CyberCrime Tracker - http://cybercrime-tracker.net/index.php
 - TheZoo - https://github.com/ytisf/theZoo
 - Endgame Ember - https://github.com/endgameinc/ember
 - Global ATM Malware Wall - http://atm.cybercrime-tracker.net/index.php
 - What is this C2 - https://github.com/misterch0c/what_is_this_c2
 - Connect Trojan - https://www.connect-trojan.com/
 - ViriBack C2 Tracker - http://tracker.viriback.com/
 - VirusBay - https://beta.virusbay.io/
 
Maps / Stats (eye candy):
- ThreatButt - https://threatbutt.com/map/
 - BitDefender - https://threatmap.bitdefender.com/
 - FireEye - https://www.fireeye.com/cyber-map/threat-map.html
 - Global Incident Map - http://www.globalincidentmap.com/
 - Tor Flow - https://torflow.uncharted.software/
 - Kaspersky Cybermap - https://cybermap.kaspersky.com/
 - Security Wizardry - http://www.securitywizardry.com/radar.htm
 - Norse Attack Map - http://map.norsecorp.com/#/
 - Digital Attack Map - http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16938&view=map
 - Stats - http://breachlevelindex.com/
 - Current Cyber Attacks - http://community.sicherheitstacho.eu/start/main
 - FSecure - http://worldmap3.f-secure.com/
 - Talos - https://talosintelligence.com/
 - Security Wizardry - https://radar.securitywizardry.com/
 - Ransomware Attack Map - https://statescoop.com/ransomware-map/
 
Memory Forensics:
- Volatility - http://www.volatilityfoundation.org/
 - Memoryze - https://www.fireeye.com/services/freeware/memoryze.html
 - DumpIt - https://blog.comae.io/your-favorite-memory-toolkit-is-back-f97072d33d5c
 - Hibr2Bin - https://blog.comae.io/your-favorite-memory-toolkit-is-back-f97072d33d5c
 - Rekall Memory Forensic Framework - https://github.com/google/rekall
 - Clonezilla - http://clonezilla.org/
 - dd - https://linux.die.net/man/1/dd
 - Fog - https://fogproject.org/
 - Forensic Toolkit (FTK) - http://www.accessdata.com/product-download
 - Redline - https://www.fireeye.com/services/freeware/redline.html
 - MemLabs - https://github.com/stuxnet999/MemLabs
 
Misc Tools:
- File Signature Analysis - https://filesignatures.net/index.php?page=all
 - EKFiddle - https://github.com/malwareinfosec/EKFiddle
 - XMind - http://www.xmind.net/
 - ExamDiff - http://www.prestosoft.com/edp_examdiff.asp
 - 7zip - http://www.7-zip.org/download.html
 - Visual Studio - https://www.visualstudio.com/
 - WinSCP - https://winscp.net/eng/download.php
 - Putty - https://www.chiark.greenend.org.uk/~sgtatham/putty/latest.html
 - TreeSizeFree - https://www.jam-software.com/treesize_free/
 - OneNote - https://www.onenote.com/
 - KeePass - https://keepass.info/
 - ExifTool - https://www.sno.phy.queensu.ca/~phil/exiftool/
 - RegEx 101 - https://regex101.com/
 - Byte Counter - https://mothereff.in/byte-counter
 - Utilu IE Collection - http://utilu.com/IECollection/
 - UserAgentString - http://www.useragentstring.com/
 - Maltego - https://www.paterva.com/web7/buy/maltego-clients/maltego-ce.php
 - Cmder - http://cmder.net/
 - MalPull - https://github.com/ThisIsLibra/MalPull
 - StringSifter - https://github.com/mandiant/stringsifter
 
.Net Debuggers/Decompilers:
- ILSpy - http://ilspy.net/
 - dnSpy - https://github.com/0xd4d/dnSpy
 - dotPeek - https://www.jetbrains.com/decompiler/
 - de4dot - https://github.com/0xd4d/de4dot
 - Reflector - https://www.red-gate.com/products/dotnet-development/reflector/index
 
Network Analysis:
- Wireshark - https://www.wireshark.org/
 - Network Miner - http://www.netresec.com/?page=NetworkMiner
 - LogRhythm Network Monitor Freemium - https://logrhythm.com/network-monitor-freemium/
 - dig - https://linux.die.net/man/1/dig
 - curl - https://curl.haxx.se/docs/manpage.html
 - ApateDNS - https://www.fireeye.com/services/freeware/apatedns.html
 - NetCat - http://netcat.sourceforge.net/
 - Nslookup - https://linux.die.net/man/1/nslookup
 - PDF Stream Dumper - http://sandsprite.com/blogs/index.php?uid=7&pid=57
 - Robtex - https://www.robtex.com/
 - Belati - https://github.com/aancw/Belati
 - Ostinato - http://ostinato.org/
 - Burp Suite - https://portswigger.net/burp/
 - Hak5 - https://hakshop.com/
 - Fiddler - https://www.telerik.com/fiddler
 - Shodan - https://www.shodan.io/
 - FakeNet-NG - https://github.com/fireeye/flare-fakenet-ng
 - Netzob - https://github.com/netzob/netzob
 - DShell - https://github.com/USArmyResearchLab/Dshell
 - SecurityOnion - https://securityonion.net/
 - Reverse engineering network protocols - Reverse Engineering Network Protocols
 - MITMProxy - https://mitmproxy.org/
 - DNSChef - https://github.com/iphelix/dnschef
 
Operating Systems:
- Remnux - https://remnux.org/
 - SIFT - https://digital-forensics.sans.org/community/downloads
 - Kali - https://www.kali.org/
 - CAINE - http://www.caine-live.net/
 - Metasploitable 3 - https://github.com/rapid7/metasploitable3
 - DVWA - http://www.dvwa.co.uk/
 - Security Onion - https://securityonion.net/
 - FLARE VM - https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html
 - OWASP WebGoat - https://www.owasp.org/index.php/WebGoat_Installation#Installing_to_Windows
 - OWASP Bricks - https://www.owasp.org/index.php/OWASP_Bricks
 - OWASP Mantra - http://www.getmantra.com/
 - Tails - https://tails.boum.org/
 - Whonix - https://www.whonix.org/
 - Santoku - https://santoku-linux.com/about-santoku/
 
OSINT Online Tools:
- OSINT Gathering - https://posts.specterops.io/gathering-open-source-intelligence-bee58de48e05
 - Automating OSINT Blog - http://www.automatingosint.com/blog/
 - SpiderFoot - https://www.spiderfoot.net/
 - Buscador - https://inteltechniques.com/buscador/
 
Password Cracking:
- Hashcat - https://github.com/hashcat/hashcat
 - Crack.sh - https://crack.sh/
 - Mimikatz - https://github.com/gentilkiwi/mimikatz
 - Ophcrack - http://ophcrack.sourceforge.net/
 
Podcasts:
- Security Now - https://www.grc.com/securitynow.htm
 - SANS Stormcast - https://isc.sans.edu/podcast.html
 - Down the Security Rabbithole - http://podcast.wh1t3rabbit.net/
 - Defensive Security - https://defensivesecurity.org/category/podcast/
 - Paul's Security Weekly - https://wiki.securityweekly.com/Show_Notes
 - RunAs Radio - http://www.runasradio.com/
 - Defensive Security Podcast - https://defensivesecurity.org/
 - Darknet Diaries - https://darknetdiaries.com/
 - Risky Business Podcast - https://risky.biz/
 - Security Nation Podcast - https://podcasts.apple.com/gb/podcast/security-nation/id1124543784
 - Smashing Security - https://www.smashingsecurity.com/
 
PowerShell decoding:
- PSDecode - https://github.com/R3MRUM/PSDecode
 - PyPowerShellXray - https://github.com/JohnLaTwC/PyPowerShellXray
 - PowerShellRunBox: Analyzing PowerShell Threats Using PowerShell Debugging - https://darungrim.com/research/2019-10-01-analyzing-powershell-threats-using-powershell-debugging.html
 
Ransomware:
- No More Ransomware - https://www.nomoreransom.org/en/index.html
 - ID Ransomware - https://id-ransomware.malwarehunterteam.com/
 - Emisoft decrypters - https://www.emsisoft.com/ransomware-decryption-tools/
 
Reading Material:
- Reverse Engineering for Beginners - https://beginners.re/
 - Phrack - http://phrack.org/
 - Crypto 101 - https://www.crypto101.io/
 - Hacker Manifesto - http://phrack.org/issues/7/3.html
 - How to Become a Hacker - http://www.catb.org/esr/faqs/hacker-howto.html
 - Zines - https://github.com/fdiskyou/Zines
 - Hackaday - https://hackaday.com/blog/
 - Hacktress - http://www.hacktress.com/
 - Reddit - https://www.reddit.com/r/ReverseEngineering/
 - Windows API Index - https://msdn.microsoft.com/en-gb/library/windows/desktop/hh920508(v=vs.85).aspx
 - Raw Hex - https://rawhex.com/
 - DigiNinja - https://digi.ninja/
 - Team Cymru - http://www.team-cymru.org/index.html
 - Lenny Zeltser - https://zeltser.com/malicious-software/
 - OverAPI - http://overapi.com/
 - HackBack - https://pastebin.com/0SNSvyjJ
 - FlexiDie - https://pastebin.com/raw/Y1yf8kq0
 - DefCon archive - https://media.defcon.org/
 - Malwology - https://malwology.com/
 - Stuxnet's Footprint in memory with Volatility - http://mnin.blogspot.co.uk/2011/06/examining-stuxnets-footprint-in-memory.html
 - AtomBombing - https://breakingmalware.com/injection-techniques/atombombing-brand-new-code-injection-for-windows/
 - Malware Archaeology - https://www.malwarearchaeology.com/cheat-sheets
 - ShinoLocker - https://shinolocker.com/
 - A crash course in x86 assembly for reverse engineers - https://sensepost.com/blogstatic/2014/01/SensePost_crash_course_in_x86_assembly-.pdf
 - Zero Days, Thousands of Nights - https://www.rand.org/pubs/research_reports/RR1751.html
 - Shadow Brokers Exploit Reference Table - https://docs.google.com/spreadsheets/d/1sD4rebofrkO9Rectt5S3Bzw6RnPpbJrMV-L1mS10HQc/edit#gid=1602324093
 - GracefulSecurity - https://www.gracefulsecurity.com/infrastructure-security-articles/
 - Cybersecurity ain't easy. Let's talk about it - https://itspmagazine.com/itsp-chronicles/cybersecurity-ain-t-easy-lets-talk-about-it
 - How to become the best malware analyst e-v-e-r - http://www.hexacorn.com/blog/2018/04/14/how-to-become-the-best-malware-analyst-e-v-e-r/
 - Definitive Dossier of Devilish Debug Details – Part One: PDB Paths and Malware - https://www.fireeye.com/blog/threat-research/2019/08/definitive-dossier-of-devilish-debug-details-part-one-pdb-paths-malware.html
 - Dr Fu's Security Blog - http://fumalwareanalysis.blogspot.com/p/malware-analysis-tutorials-reverse.html
 - Encoding vs. Encryption vs. Hashing vs. Obfuscation - https://danielmiessler.com/study/encoding-encryption-hashing-obfuscation/
 - Introduction to reverse engineering and Assembly - https://kakaroto.homelinux.net/2017/11/introduction-to-reverse-engineering-and-assembly/
 - Getting started with reverse engineering - https://lospi.net/developing/software/software%20engineering/reverse%20engineering/assembly/2015/03/06/reversing-with-ida.html
 - Guide to x86 Assembly - http://www.cs.virginia.edu/~evans/cs216/guides/x86.html
 - Nightmare (RE) - https://github.com/guyinatuxedo/nightmare
 - PDB Files: What Every Developer Must Know - https://www.wintellect.com/pdb-files-what-every-developer-must-know
 - BOLO: Reverse Engineering — Part 1 (Basic Programming Concepts) - https://medium.com/bugbountywriteup/bolo-reverse-engineering-part-1-basic-programming-concepts-f88b233c63b7
 - BOLO: Reverse Engineering — Part 2 (Advanced Programming Concepts) - https://medium.com/@danielabloom/bolo-reverse-engineering-part-2-advanced-programming-concepts-b4e292b2f3e
 - String Hashing: Reverse Engineering an Anti-Analysis Control - https://r3mrum.wordpress.com/2018/02/15/string-hashing-reverse-engineering-an-anti-analysis-control/
 - Ground Zero: Part 1 – Reverse Engineering Basics – Linux x64 - https://0xdarkvortex.dev/index.php/2018/04/09/ground-zero-part-1-reverse-engineering-basics/
 - Let's Build a Compiler - https://compilers.iecc.com/crenshaw/
 - Static Malware Analysis with OLE Tools and CyberChef - https://newtonpaul.com/static-malware-analysis-with-ole-tools-and-cyber-chef/
 - An Introduction to Reverse Engineering - https://www.muppetlabs.com/~breadbox/txt/bure.html
 - VXUnderground - https://vx-underground.org/papers.html
 - Tracking Advanced Persistent Threats (APTs) via Shared Code - https://medium.com/@arun_73782/tracking-apts-by-shared-code-5e88a2ae2363
 - YARA Hunting for Code Reuse: DoppelPaymer Ransomware & Dridex Families - https://www.sentinelone.com/blog/yara-hunting-for-code-reuse-doppelpaymer-ransomware-dridex-families/
 - Here We GO: Crimeware Virus & APT Journey From “RobbinHood” to APT28 - https://www.sentinelone.com/blog/here-we-go-crimeware-apt-journey-from-robbinhood-to-apt28/
 - The mysterious case of CVE-2016-0034: the hunt for a Microsoft Silverlight 0-day - https://securelist.com/the-mysterious-case-of-cve-2016-0034-the-hunt-for-a-microsoft-silverlight-0-day/73255/
 - Process Injection part 1 of 5 - https://3xpl01tc0d3r.blogspot.com/2019/08/process-injection-part-i.html
 - OSINT : Chasing Malware + C&C Servers - https://medium.com/secjuice/chasing-malware-and-c-c-servers-in-osint-style-3c893dc1e8cb
 - Daily dose of malware - https://github.com/woj-ciech/Daily-dose-of-malware
 - Tracking Malware with Import Hashing - https://www.fireeye.com/blog/threat-research/2014/01/tracking-malware-import-hashing.html
 - STOMP 2 DIS: Brilliance in the (Visual) Basics - https://www.fireeye.com/blog/threat-research/2020/01/stomp-2-dis-brilliance-in-the-visual-basics.html
 - Advanced Binary Deobfuscation - https://github.com/malrev/ABD
 - A Case Study Into Solving Crypters/packers in Malware Obfuscation Using an SMT Approach - https://vixra.org/abs/2002.0183
 - ReCon Montreal Archives - https://recon.cx/2019/montreal/archives/
 - FLARE IDA Pro Script Series: MSDN Annotations IDA Pro for Malware Analysis - https://www.fireeye.com/blog/threat-research/2014/09/flare-ida-pro-script-series-msdn-annotations-ida-pro-for-malware-analysis.html
 - Analyzing Modern Malware Techniques - Part 1 (of 4) - https://0x00sec.org/t/analyzing-modern-malware-techniques-part-1/18663
 - What Every Computer Programmer Should Know About Windows API, CRT, and the Standard C++ Library - https://www.codeproject.com/Articles/22642/What-Every-Computer-Programmer-Should-Know-About-W
 - theForger's Win32 API Programming Tutorial - http://www.winprog.org/tutorial/start.html
 - Unbreakable Cryptography in 5 Minutes - https://blog.xrds.acm.org/2012/08/unbreakable-cryptography-in-5-minutes/
 - Let’s play (again) with Predator the thief - https://fumik0.com/2019/12/25/lets-play-again-with-predator-the-thief/
 - VMProtect Introduction - https://shhoya.github.io/vmp_vmpintro.html
 - Azorult loader stages - https://maxkersten.nl/binary-analysis-course/malware-analysis/azorult-loader-stages/
 - Reversing Malware Command and Control: From Sockets to COM - https://www.fireeye.com/blog/threat-research/2010/08/reversing-malware-command-control-sockets.html
 - Indicators of Compromise (IoCs) and Their Role in Attack Defence - https://tools.ietf.org/html/draft-paine-smart-indicators-of-compromise-00
 - Zombieland CTF – Reverse Engineering for Beginners - https://mcb101.blog/2019/10/11/zombieland-ctf-reverse-engineering-for-beginners/
 - Fu11Shade Windows Exploitation - https://fullpwnops.com/windows-exploitation-pathway.html
 
Sandbox Tools (Online):
- VirusTotal - https://www.virustotal.com
 - Malwr - https://malwr.com/
 - Reverse.it - https://www.reverse.it/
 - Open Analysis - http://www.openanalysis.net/
 - ANY.RUN - https://any.run/
 - Hybrid Analysis - https://www.hybrid-analysis.com/
 - Intezer Analyze - https://analyze.intezer.com/
 
Sandbox Tools (Offline):
- Noriben - https://github.com/Rurik/Noriben
 - Cuckoo - https://www.cuckoosandbox.org/
 - PyREBox - https://github.com/Cisco-Talos/pyrebox
 - Viper - http://viper.li/
 - MISP - http://www.misp-project.org/
 - Sandboxie - https://www.sandboxie.com/
 - Ph0neutria - https://github.com/phage-nz/ph0neutria
 - FlareVM - https://www.fireeye.com/blog/threat-research/2017/07/flare-vm-the-windows-malware.html
 
Shellcode Tools:
- JMP2IT - https://github.com/adamkramer/jmp2it
 - Shellcode2exe.py - https://github.com/MarioVilas/shellcode_tools
 - ConvertShellCode - http://le-tools.com/ConvertShellcode.html
 - scdbg - http://sandsprite.com/blogs/index.php?uid=7&pid=152
 
Static Analysis Tools:
- PEiD -https://www.aldeid.com/wiki/PEiD
 - McAfee FileInsight - https://www.mcafee.com/uk/downloads/free-tools/fileinsight.aspx
 - HashMyFiles - http://www.nirsoft.net/utils/hash_my_files.html
 - CFF Explorer - http://www.ntcore.com/exsuite.php
 - AnalyzePESig - https://blog.didierstevens.com/2012/10/01/searching-for-that-adobe-cert/
 - ByteHist - https://www.cert.at/downloads/software/bytehist_en.html
 - Exeinfo - http://exeinfo.pe.hu/
 - Scylla - https://github.com/NtQuery/Scylla
 - MASTIFF - https://git.korelogic.com/mastiff.git/
 - PEframe - https://github.com/guelfoweb/peframe
 - PEscan - https://tzworks.net/prototype_page.php?proto_id=15
 - PEstudio - https://www.winitor.com/
 - PE-Bear - https://hshrzd.wordpress.com/2013/07/09/introducing-new-pe-files-reversing-tool/
 - PE-sieve - https://github.com/hasherezade/pe-sieve
 - Flare-Floss - https://github.com/fireeye/flare-floss
 - PatchDiff2 - https://github.com/filcab/patchdiff2
 - PE Insider - http://cerbero.io/peinsider/
 - Resource Hacker - http://www.angusj.com/resourcehacker/
 - DarunGrim - https://github.com/ohjeongwook/DarunGrim
 - Mal Tindex - https://github.com/joxeankoret/maltindex
 - Manalyze - https://github.com/JusticeRage/Manalyze
 - PDBlaster - https://github.com/SecurityRiskAdvisors/PDBlaster
 - ImpFuzzy - https://github.com/JPCERTCC/impfuzzy
 - Florentino - https://github.com/0xsha/florentino/blob/master/README.md
 - Viper - https://viper.li/en/latest/
 
Text/hex Editor Tools:
- Notepad++ - https://notepad-plus-plus.org/
 - 010 Editor - https://www.sweetscape.com/010editor/
 - HxD - https://mh-nexus.de/en/hxd/
 - BinText - https://www.aldeid.com/wiki/BinText
 - Hexinator - https://hexinator.com/
 
Threat Intelligence:
- ThreatMiner - https://www.threatminer.org/
 - RiskIQ Community - https://community.riskiq.com/home
 - PasteBin - https://pastebin.com/
 - Shodan - https://www.shodan.io/
 - Censys - https://censys.io/
 - DNSdumpster - https://dnsdumpster.com/
 - URLHaus - https://urlhaus.abuse.ch/
 - AlienVault OTX - https://otx.alienvault.com/
 - C2 Tracker - http://tracker.viriback.com/stats.php
 - MISP - https://www.misp-project.org/
 - The Hive - https://thehive-project.org/
 - Yeti - https://yeti-platform.github.io/
 - Using ATT&CK for CTI Training - https://attack.mitre.org/resources/training/cti/
 - PasteScraper - https://github.com/PimmyTrousers/pastescraper
 
Training:
- Cybrary - https://www.cybrary.it/
 - Corelan Team - https://www.corelan.be/
 - Open Security Training - http://opensecuritytraining.info/Training.html
 - Offensive Computer Security - http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html
 - PentesterLab - https://pentesterlab.com/
 - Malware Traffic Analysis - http://www.malware-traffic-analysis.net/training-exercises.html
 - MIT Open Courseware - https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-858-computer-systems-security-fall-2014/video-lectures/
 - OALabs - https://vimeo.com/oalabs
 - OALabs - https://www.youtube.com/channel/UC--DwaiMV-jtO-6EvmKOnqg/videos
 - MalwareAnalysisForHedgeHogs - https://www.youtube.com/channel/UCVFXrUwuWxNlm6UNZtBLJ-A
 - Malware Unicorn - https://securedorg.github.io/
 - Tuts4You - https://tuts4you.com/
 - Lenas Reversing for Newbies - https://tuts4you.com/download.php?list.17
 - Introduction to WinDBG - https://www.youtube.com/watch?list=PLhx7-txsG6t6n_E2LgDGqgvJtCHPL7UFu&time_continue=1&v=8zBpqc3HkSE
 - Colin Hardy - https://www.youtube.com/channel/UCND1KVdVt8A580SjdaS4cZg/videos
 - OWASP AppSec Tutorials - http://owasp-academy.teachable.com/p/owasp-appsec-tutorials
 - Modern Binary Exploitation - https://github.com/RPISEC/MBE
 - FuzzySecurity - http://www.fuzzysecurity.com/tutorials.html
 - Linux Journey - https://linuxjourney.com/
 - Pivot Project - http://pivotproject.org/
 - Security Tube - http://www.securitytube-training.com/index.html
 - Packet Life Cheat Sheets - http://packetlife.net/library/cheat-sheets/?escaped_fragment=#!
 - SecurityXploded - http://securityxploded.com/
 - MalwareMustDie - https://www.youtube.com/playlist?list=PLSe6fLFf1YDX-2sog70220BchQmhVqQ75
 - Win32Assembly - http://win32assembly.programminghorizon.com/tutorials.html
 - RPISEC - https://github.com/RPISEC/Malware/blob/master/README.md
 - RPISEC - https://github.com/RPISEC/MBE
 - Reverse Engineering Challenges - https://challenges.re/
 - HackerOne - https://www.hackerone.com/
 - Google Python Class - https://developers.google.com/edu/python/
 - Guide to x86 Assembly - http://www.cs.virginia.edu/~evans/cs216/guides/x86.html
 - Code Blocks - http://www.codeblocks.org/
 - Wireshark Course - https://www.youtube.com/watch?v=XTSc2mPF4II&t=25s
 - Maltrak Malware Analyst webinar - http://maltrak.com/webinar-registration
 - Intro to ARM assembly basics - https://azeria-labs.com/writing-arm-assembly-part-1/
 - Life in Hex - https://lifeinhex.com/category/reversing/
 - The Cuckoo's Egg Decompiled Online Course - http://chrissanders.org/cuckoosegg/
 - Creating Yara Rules for Malware Detection - https://www.real0day.com/hacking-tutorials/yara
 - Windows Privilege Escalation Guide - https://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/
 - Amr Thabet shellcode training - https://www.youtube.com/channel/UCkY_8Hz8ojyQQ9S6bPnHa7g
 - Hexacorn Converting Shellcode to Portable Executable (32- and 64- bit) - http://www.hexacorn.com/blog/2015/12/10/converting-shellcode-to-portable-executable-32-and-64-bit/
 - Learn Forensics with David Cowen - https://www.youtube.com/user/LearnForensics/featured
 - Raphael Mudge (various, In-memory evasion/detection) - https://www.youtube.com/user/DashnineMedia/videos
 - Assembly programming tutorial - https://www.tutorialspoint.com/assembly_programming/index.htm
 - RPISec Training - https://github.com/RPISEC/Malware
 - Intro to Computer Science - https://www.edx.org/course/introduction-to-computer-science-and-programming-7
 - Ringzer0 - https://www.ringzer0.training/
 - Reversing Hero - https://www.reversinghero.com/
 - MIT Open Courseware - https://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-00-introduction-to-computer-science-and-programming-fall-2008/video-lectures/
 - Reverse Engineering and malware analysis 101 - https://github.com/abhisek/reverse-engineering-and-malware-analysis
 - Reverse engineering intel x64 - https://github.com/0xdidu/Reverse-Engineering-Intel-x64-101
 - C++ Tutorial for Beginners - Full Course - https://www.youtube.com/watch?v=vLnPwxZdW4Y
 - ELF Reversing Tutorial - https://www.youtube.com/playlist?list=PLsNNY-Xea3ra42GZDnvTB46G4p-5oUpFf
 - Adversary Tactics: PowerShell - https://github.com/specterops/at-ps
 - Malware Unicorn Reverse Engineering 101 - https://malwareunicorn.org/workshops/re101.html#0
 - Modern Binary Exploitation - http://security.cs.rpi.edu/courses/binexp-spring2015/
 - Ghidra Courses - https://ghidra.re/online-courses/
 - Technical Writing Courses - https://developers.google.com/tech-writing
 - Introduction to Malware Analysis and Reverse Engineering - https://class.malware.re/
 - Binary Analysis Course - https://maxkersten.nl/binary-analysis-course/
 - Josh Stroschein - https://www.youtube.com/user/jstrosch/videos
 - How to hack together your own CS degree online for free - https://www.freecodecamp.org/news/how-to-hack-your-own-cs-degree-for-free/
 - Zero 2 Automated - https://courses.zero2auto.com/adv-malware-analysis-course
 
Unpacking:
- UnpacMe - https://www.unpac.me/#/
 - Unipacker - https://github.com/unipacker/unipacker
 
VBA Deobfuscation Tools:
- pcodedmp - https://github.com/bontchev/pcodedmp
 - vba-dynamic-hook - https://github.com/eset/vba-dynamic-hook
 - ViperMonkey - https://github.com/decalage2/ViperMonkey
 
Video:
- Teach Yourself Computer Science - https://teachyourselfcs.com/
 - CS50 at Harvard - https://cs50.harvard.edu/
 - J4vv4D - https://www.j4vv4d.com/videos/
 - Movies for Hackers - https://github.com/k4m4/movies-for-hackers
 - Can You Hack It - https://www.youtube.com/watch?v=GWr5kbHt_2E
 - Chris Nickerson talk - http://www.irongeek.com/i.php?page=videos/derbycon5/teach-me14-started-from-the-bottom-now-im-here-how-to-ruin-your-life-by-getting-everything-you-ever-wanted-chris-nickerson
 - Zoz - Don't Fuck it Up - https://www.youtube.com/watch?v=J1q4Ir2J8P8
 - Rob Joyce (NSA) - Disrupting Nation State Hackers - https://www.youtube.com/watch?v=bDJb8WOJYdA
 - Movies for Hackers - https://github.com/k4m4/movies-for-hackers
 - Wannacry: The Marcus Hutchins Story - All 3 Chapters - https://www.youtube.com/watch?v=vveLaA-z3-o&t=451s
 - DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering - https://www.youtube.com/watch?v=HlUe0TUHOIc
 - SAS2018: Finding aliens, star weapons and ponies with YARA - https://www.youtube.com/watch?v=fbidgtOXvc0
 
XOR Decoding Tools:
- bbcrack - https://www.decalage.info/python/balbuzard
 - Brutexor - https://www.aldeid.com/wiki/Brutexor-iheartxor
 - ConverterNET - http://www.kahusecurity.com/2017/converternet-v0-1-released/
 - NoMoreXOR - https://github.com/hiddenillusion/NoMoreXOR
 
Yara Related:
- Yara - https://virustotal.github.io/yara/
 - Stringless Yara Rules - https://inquest.net/blog/2018/09/30/yara-performance
 - YarGen - https://github.com/Neo23x0/yarGen
 - Yara-Rules - https://github.com/Yara-Rules/rules
 - CONFidence 2019: "Utilizing YARA to Find Evolving Malware" - Jay Rosenberg - https://www.youtube.com/watch?v=XMZ-c2Zwzjg
 - SANS Webcast - YARA - Effectively using and generating rules - https://www.youtube.com/watch?v=5A_O8X_JljI
 - Klara - https://github.com/KasperskyLab/klara
 - Open Source Yara Rules - https://github.com/mikesxrs/Open-Source-YARA-rules