Skip to content

Latest commit

 

History

History
105 lines (97 loc) · 6.64 KB

README.md

File metadata and controls

105 lines (97 loc) · 6.64 KB

Malicious Software Research


A repository dedicated to researching, analyzing, documenting, and ultimately, defending against various strains of malicious software and their behaviors.


Table of Contents


Environment

git clone https://github.com/0xvpr/Malicious-Software-Research
cd Malicious-Software-Research
chmod +x build-image.sh run-image.sh
./build-image.sh
./run-image.sh

Code Examples

  1. Shellcode Crafting
  2. Storage Techniques
  3. Injection Techniques
  4. Obfuscation Techniques
  5. Ransomware
  6. Evasion
  7. Living Off The Land
  8. Socket
  9. Keyloggers
  10. Droppers
  11. Hooking Techniques

Credits & Learning Resources

  • Educational Use Only: All examples and code herein are for educational and research purposes only.
  • No Warranty: The repository is provided “as is”, without warranty of any kind, express or implied.
  • Legal Responsibility: You are solely responsible for ensuring that your use of these materials complies with all applicable laws and regulations.

If you have any doubts regarding the legality or ethics of using these examples, do not proceed.

This repository is released under the MIT License. In short:

  • You are free to use, modify, and distribute this code for personal or commercial purposes.
  • Please include credit where credit is due.
  • The authors/contributors are not liable for any misuse or damage caused by this code.