Skip to content
View lehasaS's full-sized avatar
📖
Learning and Growing
📖
Learning and Growing

Block or report lehasaS

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Stars

Malware Research

30 repositories

SymPaths: Symbolic Execution Meets Partial Order Reduction

4 Updated Jan 21, 2020

A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.

56 9 Updated Mar 4, 2023

A secure sandbox environment for malware developers and red teamers to test payloads against detection mechanisms before deployment. Integrates with LLM agents via MCP for enhanced analysis capabil…

YARA 1,240 139 Updated Nov 12, 2025
Python 11 1 Updated Nov 17, 2025

In-the-wild malware sample masquerading as Cisco Webex – April 2025

6 1 Updated Apr 25, 2025

Practical P-Code examples

C 65 3 Updated Feb 12, 2021

Example skeleton to create self contained Ghidra Scripts

Java 3 Updated Dec 15, 2025

CERT Kaiju is a binary analysis framework extension for the Ghidra software reverse engineering suite. This repository is the primary, canonical repository for this project -- file bug reports and …

Java 307 25 Updated Dec 18, 2025

The Z3 Theorem Prover

C++ 11,725 1,588 Updated Dec 20, 2025

Demo from the Malware Analysis and Development Webinar

C++ 23 1 Updated Apr 17, 2024

Example AIDL service and client

Java 11 7 Updated Nov 30, 2021

Codebase to generate an msdt-follina payload

Python 1,633 386 Updated Jun 8, 2022

A curated list of awesome malware analysis tools and resources

120 16 Updated Jan 8, 2022

A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.

Python 3,381 526 Updated Jan 19, 2025

The Official Radare2 Book

C 867 242 Updated Dec 18, 2025

Malware Detection with Convolutional Neural Network

Jupyter Notebook 11 5 Updated Nov 15, 2021

Fake msxfs.dll to debug ATM trojans

C 2 Updated Aug 1, 2019

XFS API for Rohitab API Monitor

2 1 Updated Jul 25, 2024

An android Dex protection shell implementation

Java 841 293 Updated Dec 19, 2025

Tool to decompile & extract Android Dex bytecode from Vdex files

C 1,103 239 Updated Jul 23, 2024

Fake msxfs.dll to debug ATM trojans

C 55 26 Updated Sep 28, 2015

Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysis and hunting designed for intel and malware analysts as wel…

PowerShell 1,299 257 Updated Jun 1, 2023

for Windows Malware Analysis

15 1 Updated May 14, 2020

Awesome Malware Analysis, a wide range of information/tools related to reverse engineering.

5 Updated Oct 13, 2024

Course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories

Jupyter Notebook 1,156 175 Updated Nov 14, 2020

Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read

Python 1,349 128 Updated Feb 21, 2025

Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT.

C++ 112 22 Updated Dec 8, 2025

x86 malware emulator

Rust 254 34 Updated Nov 23, 2025

Course materials for hackaday.io Ghidra training

C 418 92 Updated Dec 26, 2023

Ghidra is a software reverse engineering (SRE) framework

Java 62,898 6,988 Updated Dec 19, 2025