- Sandton, Gauteng
-
16:43
(UTC +02:00) - https://lehasas.github.io/
- in/lehasas
- lehasa_s
Malware Research
SymPaths: Symbolic Execution Meets Partial Order Reduction
A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.
A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…
In-the-wild malware sample masquerading as Cisco Webex – April 2025
Example skeleton to create self contained Ghidra Scripts
CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is the primary, canonical repository for this project -- file bug reports and …
Demo from the Malware Analysis and Development Webinar
Codebase to generate an msdt-follina payload
A curated list of awesome malware analysis tools and resources
A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
Malware Detection with Convolutional Neural Network
An android Dex protection shell implementation
Tool to decompile & extract Android Dex bytecode from Vdex files
Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as wel…
Awesome Malware Analysis, a wide range of information/tools related to reverse engineering.
Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.
Course materials for hackaday.io Ghidra training
Ghidra is a software reverse engineering (SRE) framework