Skip to content

Euler-Constant/Malware-Exploitation-Journey

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 

Repository files navigation

MALWARE EXPLOITATION: JOURNEYING THROUGH IT

DISCLAIMER: PLEASE MAKE SURE YOU ARE PRACTICING ON A VIRTUAL ENVIRONMENT.

Cybersecurity was not in the bingo card of the list of things that would eventually pique my interests this year, but it did. And so did malware analysis. I'm deciding to document this because I'm just starting out with it, and the beginning of this would be a chapter-by-chapter series of the book "Practical Malware Analysis" over the course of the next few weeks, or months.

About

Documenting my progress and journey in malware analysis, development and exploitation techniques

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published