Malware Handbook
  • Preface
  • Author
  • Prerequisites for Malware
  • Prerequisites for Lab Set-Up
  • Setting Up Labs
  • Download Sample Malware Exercises
  • Intro to Assembly Language
  • Assembly Language Basics
  • Commonly Used Instructions
  • Win32 Assembly Programming
  • PE Format
    • PE32
    • PE32+
  • Malware
    • Types of Malware
    • Malware Classification by Windows Defender
    • Sourcing Malware
  • Malware Development
  • Malware Analysis
    • Malware Analysis Methodologies
      • Static Analysis
        • Static Analysis Tools/Methods
        • Static Analysis of Sample Files
      • Dynamic Analysis
        • Dynamic Analysis Tools/Methods
        • Analyzing Files with Regshot, Process Monitor, and Wireshark
        • Analyzing calc.exe and Network Activity
      • Manual Code Reversing
        • Reverse Engineering Simple Windows Executable Files
        • Reverse Engineering re_lotsastuff.exe
        • Reverse Engineering re_lotsastuff.exe Using Ghidra
      • Analyzing PowerShell Scripts
      • Analyzing JavaScript Samples
        • Analyzing JavaScript in HTML
      • Analyzing Macro Code in Office Documents
      • Setting Up REMnux Environment
        • Setting Up and Configuring FakeNet in REMnux
      • Analyzing an ELF File
      • Analyzing ASPX Webshells
      • Analyzing JAR Files
    • SAMPLE NOTES (of Notes.txt)
Powered by GitBook
On this page

Preface

NextAuthor

Last updated 8 months ago

Please Don't Forget to Hit ⭐

This book is written for people who want to understand the internals of Malware, its Development and Analysis, and also for security researchers who want to get started in the field of Malware.

Note - This book is under process and will be completed/updated regularly as well, as and when I come cross something which needs updation.

The major section of the book cover Introduction to Malware, followed by Development and Analysis. Initial topics in each cover mostly theoretical concepts whereas latter ones cover practical concepts or demos on a random malware. It is assumed that the reader is unfamiliar with this topic. For experienced readers, this text might be good for a quick revision.

The source code for the book can be found on .

The canonical URL for the book is .

GitHub
here