Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT
Tech Zealots
Follow
Tech Zealots
  • MALWARE ANALYSIS
    • A Beginner’s Guide To PE File Format
    • What’s Import Address Table (IAT) In an Executable
  • SANDBOX
    • How to Install Cuckoo Sandbox? [Part 1]
    • How To Configure Guest Machine For Cuckoo? [Part 2]
  • THREAT LAB
  • RESOURCES
  • ABOUT

Resources

Below are some of the resources I have collected from the web which I found to be very useful during analysis.

Malware Analysis

https://github.com/zbetcheckin/PDF_analysis

https://github.com/michalmalik/linux-re-101

Assembly Language & Reverse Engineering

https://www.pentesteracademy.com/course?id=3

https://github.com/Kan1shka9/x86-Assembly-Language-and-Shellcoding-on-Linux

Books

Practical Malware Analysis

Malware Analyst’s Cookbook and DVD

about
About Me

Satyajit Daulaguphu

Satyajit brings over 8 years of expertise in Cyber Security to his role as a Threat Detection Engineer at Trellix, focusing on malware research, threat detection, and blog writing.

Support Tech Zealots

Subscribe to Our Newsletter

Get exclusive updates on the latest Malware Research articles – because staying ahead is staying secure.

Tech Zealots
© 2023. All Rights Reserved.
  • Privacy Policy
  • Cookies Policy
  • Write for Us