mirror of
https://github.com/kh4sh3i/Malware-Analysis.git
synced 2024-12-18 10:26:08 +00:00
Update README.md
This commit is contained in:
parent
3165fcdae6
commit
3a17a04028
77
README.md
77
README.md
@ -1,2 +1,79 @@
|
||||
# Malware-Analysis
|
||||
A curated list of awesome malware analysis tools and resources
|
||||
|
||||
### Types of Malware Attacks
|
||||
<table id="tablepress-2">
|
||||
<thead>
|
||||
<tr>
|
||||
<th><center>Type</center></th>
|
||||
<th><center>What It Does</center></th>
|
||||
<th><center>Real-World Example</center></th>
|
||||
</tr>
|
||||
</thead>
|
||||
<tbody>
|
||||
<tr>
|
||||
<td><center>Ransomware</center></td>
|
||||
<td><center>disables victim's access to data until ransom is paid</center></td>
|
||||
<td><center>RYUK</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Fileless Malware</center></td>
|
||||
<td><center>makes changes to files that are native to the OS</center></td>
|
||||
<td><center>Astaroth</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Spyware</center></td>
|
||||
<td><center>collects user activity data without their knowledge</center></td>
|
||||
<td><center>DarkHotel</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Adware</center></td>
|
||||
<td><center>serves unwanted advertisements</center></td>
|
||||
<td><center>Fireball</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Trojans</center></td>
|
||||
<td><center>disguises itself as desirable code</center></td>
|
||||
<td><center>Emotet</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Worms</center></td>
|
||||
<td><center>spreads through a network by replicating itself</center></td>
|
||||
<td><center>Stuxnet</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Rootkits</center></td>
|
||||
<td><center>gives hackers remote control of a victim's device</center></td>
|
||||
<td><center>Zacinlo</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Keyloggers</center></td>
|
||||
<td><center>monitors users' keystrokes</center></td>
|
||||
<td><center>Olympic Vision</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Bots</center></td>
|
||||
<td><center>launches a broad flood of attacks</center></td>
|
||||
<td><center>Echobot</center></td>
|
||||
</tr>
|
||||
<tr>
|
||||
<td><center>Mobile Malware</center></td>
|
||||
<td><center>infects mobile devices</center></td>
|
||||
<td><center>Triada</center></td>
|
||||
</tr>
|
||||
</tbody>
|
||||
</table>
|
||||
|
||||
|
||||
|
||||
|
||||
### Which programming languages should I learn?
|
||||
* Python
|
||||
* C++
|
||||
* Assembly
|
||||
|
||||
|
||||
|
||||
### Books
|
||||
* [Practical Malware Analysis](https://www.amazon.co.uk/Practical-Malware-Analysis-Hands-Dissecting/dp/1593272901/)
|
||||
* [Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation](https://www.amazon.co.uk/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315)
|
||||
|
Loading…
Reference in New Issue
Block a user