Malware Analysis

Reading Time: < 1 minute

Last Updated: 9/9/2024

This is going to be a jumping off page that needs more development. I am going to keep the following loose collection of random note clipping until I can expand this out a bit. I am putting John Hammond up at the top as I have looked at his material for a few years and have always found it to be useful in this area. I would caution to be careful in this area. I am not making any particular recommendations for trying any of this. As a warning: I would caution of making a studied approach about dev ops and working in a sandboxed environment before doing anything more than watching a you tube.

https://www.youtube.com/@_JohnHammond

https://www.youtube.com/watch?v=qzGLCqW_wrM
JavaScript that drops a RAT – Reverse Engineer it like a pro

https://www.huntress.com/blog/understanding-evil-how-to-reverse-engineer-malware

https://www.sans.org/cyber-security-courses/reverse-engineering-malware-malware-analysis-tools-techniques/