Blog:
(You can find the courses in Telegram groups or here.)
Antivirus Scan
- [cocomelonc](https://cocomelonc.github.io/)
- [Crow's Nest](https://www.crow.rip/crows-nest/mal/dev)
- [0xPat blog](https://0xpat.github.io/)
- [Red Team Notes - Code & Process Injection](https://www.ired.team/offensive-security...-injection)
- [@0xHossam](https://medium.com/@0xHossam/)
- [XIT](https://x-it.medium.com/)
- [Veli Tekin](https://vvelitkn.com/categories/#malware-analysis)
- [Shorsec](https://shorsec.io/blog/dll-notification-injection/)
- [Reconshell](https://reconshell.com/malware-techniques/)
- [vx-underground](https://www.vx-underground.org/papers.html)
- [malware-development-for-dummies](https://github.com/chvancooten/maldev-fo...or-dummies)
- [awesome-malware-development](https://github.com/rootkit-io/awesome-ma...evelopment)
- [redcode-labs](https://github.com/redcode-labs)
- [offensive-nim](https://github.com/byt3bl33d3r/OffensiveNim)
- [yassirlaaouissi/Malware](https://github.com/yassirlaaouissi/Malware)
- [mvelazc0/defcon27_csharp_workshop](https://github.com/mvelazc0/defcon27_csharp_workshop)
- [maldev-for-dummies](https://github.com/chvancooten/maldev-for-dummies)
- [malware-study](https://github.com/albertzsigovits/malware-study)
- [MalwareSourceCode](https://github.com/vxunderground/MalwareSourceCode)
- [Malware-Feed](https://github.com/MalwareSamples/Malware-Feed/)
- [malware-samples](https://github.com/InQuest/malware-samples)
- [Defuse](https://defuse.ca/)
- [CyberChef](https://gchq.github.io/CyberChef/)
- [Phind](https://www.phind.com/)
- [You.com](https://you.com/code)
- [Malapi.io](https://malapi.io/)
- [Unprotect.it](https://unprotect.it/about/)
- [Zer0Mem0ry](https://www.youtube.com/c/Zer0Mem0ry/videos)
- [Mitch Edwards](https://www.youtube.com/@valhalla_dev/streams)
- [malware-stuff](https://www.youtube.com/playlist?list=PL...802ECU5ybV)
- [@C5pider](https://www.youtube.com/@C5pider)
(You can find the courses in Telegram groups or here.)
- [SEKTOR7 Institute](https://institute.sektor7.net/)
- [Maldev Academy](https://maldevacademy.com/)
- [Practical Malware Analysis](https://samsclass.info/126/126_F22.shtml)
- [NETSPI](https://www.netspi.com/training/dark-sid...lware-dev/)
- [Win32 API](https://learn.microsoft.com/en-us/windows/win32/api/)
- [Evasion techniques](https://evasions.checkpoint.com/)
- [NTAPI Undocumented Functions](http://undocumented.ntinternals.net/)
- [C-programming](https://codeforwin.org/c-programming/)
- [Modern-CPP-Programming](https://github.com/federico-busato/Moder...rogramming)
- [Doc-rust](https://doc.rust-lang.org/book/)
- [Antivirus Bypass Techniques](https://www.amazon.com/Antivirus-Bypass-...1801079749)
- Black Mass Volume
- [Black Mass Volume I](https://samples.vx-underground.org/root/...202022.pdf)
- [Black Mass Volume II](https://samples.vx-underground.org/root/...e%20II.pdf)
- [Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems](https://www.amazon.com/Evading-EDR-Defin...1718503342)
- [Reverse Engineering for Beginners](https://beginners.re/)
- [Reversing: Secrets of Reverse Engineering](https://www.foo.be/cours/dess-20122013/b...(2005).pdf)
- [Practical Reverse Engineering](https://repo.zenk-security.com/Reversing...eering.pdf)
- [Practical_Malware_Analysis](https://doc.lagout.org/security/Malware%...alysis.pdf)
- [The IDA Pro Book](https://raw.githubusercontent.com/nixawk...n.2011.pdf)
- [Best Reverse Engineering Books](https://kalitut.com/best-reverse-engineering-books/)
- [Reverse Engineering Books](https://www.goodreads.com/shelf/show/rev...ngineering)
- [Offensive-Shellcode-Scratch](https://www.amazon.com/Offensive-Shellco...1803247428)
Antivirus Scan
- [AntiScan](https://antiscan.me/)
- [Kleenscan](https://kleenscan.com/index)