0% found this document useful (0 votes)
20 views40 pages

ChatGPT for Cybersecurity #3

The document outlines various techniques and tools for malware analysis, including the use of Windows APIs, parsing malicious documents, and creating YARA rules. It also covers reverse engineering concepts, C++ programming examples, and methods for analyzing and unpacking malware. Additionally, it provides insights into debugging and automating malware analysis processes using Python and other tools.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views40 pages

ChatGPT for Cybersecurity #3

The document outlines various techniques and tools for malware analysis, including the use of Windows APIs, parsing malicious documents, and creating YARA rules. It also covers reverse engineering concepts, C++ programming examples, and methods for analyzing and unpacking malware. Additionally, it provides insights into debugging and automating malware analysis processes using Python and other tools.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

ChatGPT for Cybersecurity #2

Joas Antonio dos Santos


https://www.linkedin.com/in/joas-antonio-dos-santos

#malwareanalysis #c++ #reverseengineering


Malware Analysis
What Windows APIs are used by malware?
How to parse malicious documents with EML
format?
How to parse malicious documents with MSI
and CHM format?
Create example to yara rules for malware
detection
What are Windows Computer Networking
APIs?
How to Unpack Malware with x64dbg?
How to Analyze Macro Infected Documents
and what tools are useful?
How to Detecting a debugger using PEB?
How to analyze persistence mechanisms in a
malware?
Development simple plugin in IDA?
Create example code plugin in IDA to automating
runtime data collection in C++ and Python
How to extract information from C2 in a
malware?
KLBanker decryption string using Python
Example
How to Decode string and payload
obfuscation using python
Using debuggers for dumping packed
malware from memory
Deobfuscation, unpacking, and decoding of
obfuscated malicious JavaScript
Create PE Analyzer using Python with
Capstone
All commands to Malware Analysis using
Volatility
Analysing Shellcode Statically and Dynamically
using Debugger tools
Analyzing multi-technology and "fileless"
malware with IDA Pro
C++ Study
Example Strings and Associated Classes in C++
Inheritance Example with C++
Example Pointers in C++
Example Exception and Error treatment in
C++
Development example using MessageBox
Windows API with C++
Create examples of Functions, Vectors with
C++
Create examples of Variables, Constructors
with C++
Create examples of Destructors with C++
Reverse Engineering
How to Identifying key assembly constructs
with a disassembler
Example Register x86 in Assembly
Stack and Function x86/x64 in Assembly
How to reverse engineering in Driver Kernel?
Writing automated scripts to scale parsing
executable files with python
How to analyze bytecode using dnspy
Using objdump to collect section headers and
list DLLs
Using GDB to Reverse Engineering .elf
examples

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy