Mar 27, 2026
Static Malware Analysis: Tools, Techniques and Indicators of Compromise
Master static malware analysis — PE header examination, strings extraction, YARA rules, Ghidra/IDA basics, import table analysis, …
Reverse engineering, malware research, forensics
Master static malware analysis — PE header examination, strings extraction, YARA rules, Ghidra/IDA basics, import table analysis, …
Learn dynamic malware analysis — sandbox setup with REMnux and FlareVM, Process Monitor, API monitoring, detecting sandbox evasion…