Malicious-Software-Research icon indicating copy to clipboard operation
Malicious-Software-Research copied to clipboard

A repository dedicated to researching, documenting, developing, and ultimately, defending against various strains of malicious software.

Malicious Software Research

This is a repository dedicated to researching, documenting, developing,
and ultimately, defending against various strains of malicious software.

Environment (Requires Docker)

git clone https://github.com/0xvpr/Malicious-Software-Research
cd Malicious-Software-Research
chmod +x build-image.sh run-image.sh
./build-image.sh
./run-image.sh

Navigation

Code Examples 01. Storage Techniques 02. Injection Techniques 03. Obfuscation Techniques 04. Evasion 05. Ransomware 06. Living Off The Land 07. Socket 08. Keyloggers 09. Droppers 10. Hooking Techniques

Learning Resources

Code Examples

  1. Storage Techniques
  1. Injection Techniques
  1. Obfuscation Techniques
  1. Evasion
  1. Ransomware
  1. Living Off The Land
  2. Socket
  1. Keyloggers
  1. Droppers
  1. Hooking Techniques

Learning Resources