Skip to content

Latest commit

 

History

History
74 lines (52 loc) · 3.86 KB

references.md

File metadata and controls

74 lines (52 loc) · 3.86 KB

References

Books

  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software by Michael Sikorski and Andrew Honig

    • A comprehensive guide to malware analysis techniques and tools.
  • The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory by Michael Hale Ligh, Andrew Case, Jamie Levy, and Aaron Walters

    • A detailed book on memory forensics and analyzing memory dumps.
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code by Michael Ligh, Steven Adair, Blake Hartstein, and Matthew Richard

    • A collection of practical recipes for analyzing and combating malware.

Articles and Papers

  • "The Evolution of Malware" by Symantec

    • An in-depth article on the history and evolution of malware.
  • "A Survey of Malware Detection Techniques" by IEEE

    • A research paper that reviews various malware detection methods.
  • "Understanding Modern Banking Trojans" by Kaspersky Lab

    • An article that explains the workings of modern banking Trojans.

Websites and Blogs

Tools and Resources

  • VirusTotal

    • A free online service that analyzes files and URLs for malware using multiple antivirus engines.
  • Hybrid Analysis

    • A free malware analysis service that provides detailed reports on submitted files.
  • Sysinternals Suite

    • A collection of advanced system utilities for Windows, including Process Monitor, Autoruns, and TCPView.
  • Volatility Framework

    • An open-source memory forensics framework for analyzing memory dumps.
  • YARA

    • A tool for creating rules to identify and classify malware based on patterns and signatures.

Online Courses and Tutorials

Communities and Forums

Additional Reading