Skip to content

Fe1nus/malware-analysis

Repository files navigation

Malware Analysis Portfolio

Overview

This repository is a collection of malware analysis write-ups and technical research notes. The focus is on understanding how real-world threats work — not just what they do, but how they are built, how they evade detection, and how defenders can respond effectively.

The material primarily covers malware analysis and reverse engineering, along with the TTPs observed during analysis and the evasion and anti-analysis techniques employed by the analyzed samples. Each report is grounded in hands-on work and documents methodology, decision points, and technical findings in a way that helps other analysts better understand modern malware capabilities and navigate similar cases more efficiently.


Disclaimer

This repository is provided strictly for educational and defensive research purposes.

  • No actual malware samples are included.
  • All indicators are defanged and rendered non-clickable.
  • Sensitive or potentially harmful artifacts are redacted where appropriate.

The goal is to support detection, response, and threat hunting efforts — whether you are a blue teamer getting started in the field, someone experienced who might run into something new, or simply someone who enjoys low-level stuff. :)


Analysis Reports


About

A collection of detailed malware analysis reports showcasing reverse engineering, threat research, and detection engineering capabilities.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors